Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-8648 (GCVE-0-2020-8648)
Vulnerability from cvelistv5
- n/a
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.257Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.kernel.org/show_bug.cgi?id=206361"
          },
          {
            "name": "openSUSE-SU-2020:0336",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"
          },
          {
            "name": "USN-4344-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4344-1/"
          },
          {
            "name": "USN-4345-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4345-1/"
          },
          {
            "name": "USN-4342-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4342-1/"
          },
          {
            "name": "USN-4346-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4346-1/"
          },
          {
            "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
          },
          {
            "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
          },
          {
            "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
          },
          {
            "name": "DSA-4698",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2020/dsa-4698"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200924-0004/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-09-24T11:06:09",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.kernel.org/show_bug.cgi?id=206361"
        },
        {
          "name": "openSUSE-SU-2020:0336",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"
        },
        {
          "name": "USN-4344-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4344-1/"
        },
        {
          "name": "USN-4345-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4345-1/"
        },
        {
          "name": "USN-4342-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4342-1/"
        },
        {
          "name": "USN-4346-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4346-1/"
        },
        {
          "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
        },
        {
          "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
        },
        {
          "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
        },
        {
          "name": "DSA-4698",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2020/dsa-4698"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200924-0004/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-8648",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.kernel.org/show_bug.cgi?id=206361",
              "refsource": "MISC",
              "url": "https://bugzilla.kernel.org/show_bug.cgi?id=206361"
            },
            {
              "name": "openSUSE-SU-2020:0336",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"
            },
            {
              "name": "USN-4344-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4344-1/"
            },
            {
              "name": "USN-4345-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4345-1/"
            },
            {
              "name": "USN-4342-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4342-1/"
            },
            {
              "name": "USN-4346-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4346-1/"
            },
            {
              "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
            },
            {
              "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
            },
            {
              "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
            },
            {
              "name": "DSA-4698",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2020/dsa-4698"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200924-0004/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200924-0004/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-8648",
    "datePublished": "2020-02-06T00:06:36",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.257Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-8648\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-02-06T01:15:10.890\",\"lastModified\":\"2024-11-21T05:39:11.030\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de uso de la memoria previamente liberada en el kernel de Linux versiones hasta 5.5.2, en la funci\u00f3n n_tty_receive_buf_common en el archivo drivers/tty/n_tty.c.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:P\",\"baseScore\":3.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.5.2\",\"matchCriteriaId\":\"40157F12-F9F5-4A92-A0FA-213D2809B839\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"489D20B9-166F-423D-8C48-A23D3026E33B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83FAD281-BF77-4A8A-8F29-B557A6903BE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2748912-FC54-47F6-8C0C-B96784765B8E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.kernel.org/show_bug.cgi?id=206361\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20200924-0004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4342-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4344-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4345-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4346-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4698\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.kernel.org/show_bug.cgi?id=206361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20200924-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4342-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4344-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4345-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4346-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4698\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}
  suse-su-2020:0584-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).\n- CVE-2019-19338: There was an incomplete fix for an issue with Transactional Synchronisation Extensions in the KVM code (bsc#1158954).\n- CVE-2019-14615: An information disclosure vulnerability existed due to insufficient control flow in certain data structures for some Intel(R) Processors (bnc#1160195).\n- CVE-2019-14896: A heap overflow was found in the add_ie_rates() function of the Marvell Wifi Driver (bsc#1157157).\n- CVE-2019-14897: A stack overflow was found in the lbs_ibss_join_existing() function of the Marvell Wifi Driver (bsc#1157155).\n- CVE-2019-15213: A use-after-free bug caused by a malicious USB device was found in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).\n- CVE-2019-16994: A memory leak existed in sit_init_net() in net/ipv6/sit.c which might have caused denial of service, aka CID-07f12b26e21a (bnc#1161523).\n- CVE-2019-18808: A memory leak in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption), aka CID-128c66429247 (bnc#1156259).\n- CVE-2019-19036: An issue discovered in btrfs_root_node in fs/btrfs/ctree.c allowed a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero (bnc#1157692).\n- CVE-2019-19045: A memory leak in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7 (bnc#1161522).\n- CVE-2019-19051: A memory leak in drivers/net/wimax/i2400m/op-rfkill.c allowed attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7 (bnc#1159024).\n- CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b (bnc#1161518).\n- CVE-2019-19066: A memory leak in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service (memory consumption), aka CID-0e62395da2bd (bnc#1157303).\n- CVE-2019-19318: Mounting a crafted btrfs image twice could have caused a use-after-free (bnc#1158026).\n- CVE-2019-19319: A slab-out-of-bounds write access could have occured when setxattr was called after mounting of a specially crafted ext4 image (bnc#1158021).\n- CVE-2019-19332: An out-of-bounds memory write issue was found in the way the KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could have used this flaw to crash the system (bnc#1158827).\n- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting could have led to a use-after-free in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19523: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bsc#1158823).\n- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9 (bsc#1158413).\n- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035 (bsc#1158417).\n- CVE-2019-19526: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098 (bsc#1158893).\n- CVE-2019-19527: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e (bsc#1158900).\n- CVE-2019-19528: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d (bsc#1158407).\n- CVE-2019-19529: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41 (bnc#1158381).\n- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef (bsc#1158410).\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca (bsc#1158445).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that can be caused by a malicious USB HID device, aka CID-d9d4b1e46d95 (bsc#1158824).\n- CVE-2019-19533: There was an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464 (bsc#1158834).\n- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29 (bsc#1158398).\n- CVE-2019-19535: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042 (bsc#1158903).\n- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0 (bsc#1158394).\n- CVE-2019-19537: There was a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9 (bsc#1158904).\n- CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).\n- CVE-2019-19767: There were multiple use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163 (bnc#1159297).\n- CVE-2019-19965: There was a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5 (bnc#1159911).\n- CVE-2019-19966: There was a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that could have caused a denial of service, aka CID-dea37a972655 (bnc#1159841).\n- CVE-2019-20054: There was a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e (bnc#1159910).\n- CVE-2019-20095: Several memory leaks were found in drivers/net/wireless/marvell/mwifiex/cfg80211.c, aka CID-003b686ace82 (bnc#1159909).\n- CVE-2019-20096: There was a memory leak in __feat_register_sp() in net/dccp/feat.c, aka CID-1d3ff0950e2b (bnc#1159908).\n- CVE-2020-7053: There was a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c (bnc#1160966).\n- CVE-2020-8428: There was a use-after-free bug in fs/namei.c, which allowed local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9 (bnc#1162109).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).\n- CVE-2020-8992: An issue was discovered in ext4_protect_reserved_inode in fs/ext4/block_validity.c that allowed attackers to cause a soft lockup via a crafted journal size (bnc#1164069).\n\n\nThe following non-security bugs were fixed:\n\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).\n- ACPI / video: Add force_none quirk for Dell OptiPlex 9020M (bsc#1051510).\n- ACPI / watchdog: Fix init failure with overlapping register regions (bsc#1162557).\n- ACPI / watchdog: Set default timeout in probe (bsc#1162557).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- ACPI: OSL: only free map once in osl.c (bsc#1051510).\n- ACPI: PM: Avoid attaching ACPI PM domain to certain devices (bsc#1051510).\n- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).\n- ACPI: video: Do not export a non working backlight interface on MSI MS-7721 boards (bsc#1051510).\n- ACPI: watchdog: Allow disabling WDAT at boot (bsc#1162557).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).\n- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).\n- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).\n- ALSA: hda/realtek - Fix silent output on MSI-GL73 (git-fixes).\n- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: hda: Reset stream if DMA RUN bit not cleared (bsc#1111666).\n- ALSA: hda: Use scnprintf() for printing texts for sysfs/procfs (git-fixes).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).\n- ALSA: seq: Avoid concurrent access to queue flags (git-fixes).\n- ALSA: seq: Fix concurrent access to queue current tick/time (git-fixes).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: usb-audio: Apply sample rate quirk for Audioengine D1 (git-fixes).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- apparmor: fix unsigned len comparison with less than zero (git-fixes).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).\n- ASoC: cs4349: Use PM ops \u0027cs4349_runtime_pm\u0027 (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: sun8i-codec: Fix setting DAI data format (git-fixes).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ata: ahci: Add shutdown to freeze hardware resources of ahci (bsc#1164388).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath6kl: Fix off by one error in scan completion (bsc#1051510).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).\n- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front() (bsc#1163762).\n- bcache: add code comments for state-\u003epool in __btree_sort() (bsc#1163762).\n- bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n- bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n- bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n- bcache: add more accurate error messages in read_super() (bsc#1163762).\n- bcache: add readahead cache policy options via sysfs interface (bsc#1163762).\n- bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (bsc#1163762).\n- bcache: check return value of prio_read() (bsc#1163762).\n- bcache: deleted code comments for dead code in bch_data_insert_keys() (bsc#1163762).\n- bcache: do not export symbols (bsc#1163762).\n- bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n- bcache: fix a lost wake-up problem caused by mca_cannibalize_lock (bsc#1163762).\n- bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n- bcache: fix deadlock in bcache_allocator (bsc#1163762).\n- bcache: fix incorrect data type usage in btree_flush_write() (bsc#1163762).\n- bcache: fix memory corruption in bch_cache_accounting_clear() (bsc#1163762).\n- bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n- bcache: ignore pending signals when creating gc and allocator thread (bsc#1163762, bsc#1112504).\n- bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n- bcache: reap c-\u003ebtree_cache_freeable from the tail in bch_mca_scan() (bsc#1163762).\n- bcache: reap from tail of c-\u003ebtree_cache in bch_mca_scan() (bsc#1163762).\n- bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n- bcache: remove member accessed from struct btree (bsc#1163762).\n- bcache: remove the extra cflags for request.o (bsc#1163762).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (bsc#1163762, bsc#1112504).\n- bcma: remove set but not used variable \u0027sizel\u0027 (git-fixes).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840).\n- blk-mq: make sure that line break can be printed (bsc#1164098).\n- Bluetooth: Fix race condition in hci_release_sock() (bsc#1051510).\n- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).\n- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: do not double lock the subvol_sem for rename exchange (bsc#1162943).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- btrfs: fix infinite loop during fsync after rename operations (bsc#1163383).\n- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- btrfs: fix race between adding and putting tree mod seq elements and nodes (bsc#1163384).\n- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1051510).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can: peak_usb: report bus recovery as well (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).\n- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n- cdrom: respect device capabilities during opening action (boo#1164632).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).\n- cgroup: pids: use atomic64_t for pids-\u003elimit (bsc#1161514).\n- chardev: Avoid potential use-after-free in \u0027chrdev_open()\u0027 (bsc#1163849).\n- cifs: add support for flock (bsc#1144333).\n- cifs: Close cached root handle only if it had a lease (bsc#1144333).\n- cifs: Close open handle after interrupted close (bsc#1144333).\n- cifs: close the shared root handle on tree disconnect (bsc#1144333).\n- cifs: Do not miss cancelled OPEN responses (bsc#1144333).\n- cifs: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- cifs: fix mount option display for sec=krb5i (bsc#1161907).\n- cifs: Fix mount options set in automount (bsc#1144333).\n- cifs: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- cifs: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- cifs: Properly process SMB3 lease breaks (bsc#1144333).\n- cifs: remove set but not used variables \u0027cinode\u0027 and \u0027netfid\u0027 (bsc#1144333).\n- cifs: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: mmp2: Fix the order of timer mux parents (bsc#1051510).\n- clk: qcom: rcg2: Do not crash if our parent can\u0027t be found; return an error (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: sunxi-ng: add mux and pll notifiers for A64 CPU clock (bsc#1051510).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clk: tegra: Mark fuse clock as critical (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource: Prevent double add_timer_on() for watchdog_timer (bsc#1051510).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n- configfs_register_group() shouldn\u0027t be (and isn\u0027t) called in rmdirable parts (bsc#1051510).\n- copy/pasted \u0027Recommends:\u0027 instead of \u0027Provides:\u0027, \u0027Obsoletes:\u0027 and \u0027Conflicts:\n- Cover up kABI breakage due to DH key verification (bsc#1155331).\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn-\u003ealg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: dh - add public key verification test (bsc#1155331).\n- crypto: dh - fix calculating encoded key size (bsc#1155331).\n- crypto: dh - fix memory leak (bsc#1155331).\n- crypto: dh - update test for public key verification (bsc#1155331).\n- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n- crypto: ecdh - add public key verification test (bsc#1155331).\n- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- Documentation: Document arm64 kpti control (bsc#1162623).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).\n- drivers/regulator: fix a missing check of return value (bsc#1051510).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915: Add missing include file \u003clinux/math64.h\u003e (bsc#1051510).\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)\n- e1000e: Add support for Comet Lake (bsc#1158533).\n- e1000e: Add support for Tiger Lake (bsc#1158533).\n- e1000e: Increase pause and refresh time (bsc#1158533).\n- e100: Fix passing zero to \u0027PTR_ERR\u0027 warning in e100_load_ucode_wait (bsc#1051510).\n- ecryptfs_lookup_interpose(): lower_dentry-\u003ed_inode is not stable (bsc#1158646).\n- ecryptfs_lookup_interpose(): lower_dentry-\u003ed_parent is not stable either (bsc#1158647).\n- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n- Enable CONFIG_BLK_DEV_SR_VENDOR (boo#1164632).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- ext2: check err when partial != NULL (bsc#1163859).\n- ext4, jbd2: ensure panic when aborting with zero errno (bsc#1163853).\n- ext4: check for directory entries too close to block end (bsc#1163861).\n- ext4: fix a bug in ext4_wait_for_tail_page_commit (bsc#1163841).\n- ext4: fix checksum errors with indexed dirs (bsc#1160979).\n- ext4: fix deadlock allocating crypto bounce page from mempool (bsc#1163842).\n- ext4: Fix mount failure with quota configured as module (bsc#1164471).\n- ext4: fix punch hole for inline_data file systems (bsc#1158640).\n- ext4: improve explanation of a mount failure caused by a misconfigured kernel (bsc#1163843).\n- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- firestream: fix memory leaks (bsc#1051510).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- Fix partial checked out tree build ... so that bisection does not break.\n- Fix the locking in dcache_readdir() and friends (bsc#1123328).\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/open.c: allow opening only regular files during execve() (bsc#1163845).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- fscrypt: do not set policy for a dead directory (bsc#1163846).\n- ftrace: Add comment to why rcu_dereference_sched() is open coded (git-fixes).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n- ftrace: Protect ftrace_graph_hash with ftrace_sync (git-fixes).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- gtp: avoid zero size hashtable (networking-stable-20_01_01).\n- gtp: do not allow adding duplicate tid and ms_addr pdp context (networking-stable-20_01_01).\n- gtp: fix an use-after-free in ipv4_pdp_find() (networking-stable-20_01_01).\n- gtp: fix wrong condition in gtp_genl_dump_pdp() (networking-stable-20_01_01).\n- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- hwmon: (pmbus/ltc2978) Fix PMBus polling of MFR_COMMON definitions (bsc#1051510).\n- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- init: add arch_call_rest_init to allow stack switching (jsc#SLE-11179).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- iomap: Fix pipe page leakage during splicing (bsc#1158651).\n- iommu/amd: Fix IOMMU perf counter clobbering during init (bsc#1162617).\n- iommu/arm-smmu-v3: Populate VMID field for CMDQ_OP_TLBI_NH_VA (bsc#1164314).\n- iommu/io-pgtable-arm: Fix race handling in split_blk_unmap() (bsc#1164115).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: do not throw error when trying to remove IGTK (bsc#1051510).\n- iwlwifi: mvm: fix NVM check for 3168 devices (bsc#1051510).\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- jbd2: clear JBD2_ABORT flag before journal_reset to update log tail info when load journal (bsc#1163862).\n- jbd2: do not clear the BH_Mapped flag when forgetting a metadata buffer (bsc#1163836).\n- jbd2: Fix possible overflow in jbd2_log_space_left() (bsc#1163860).\n- jbd2: make sure ESHUTDOWN to be recorded in the journal superblock (bsc#1163863).\n- jbd2: move the clearing of b_modified flag to the journal_unmap_buffer() (bsc#1163880).\n- jbd2: switch to use jbd2_journal_abort() when failed to submit the commit record (bsc#1163852).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n- kABI: protect struct sctp_ep_common (kabi).\n- kconfig: fix broken dependency in randconfig-generated .config (bsc#1051510).\n- kernel-binary.spec.in: do not recommend firmware for kvmsmall and azure flavor (boo#1161360).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n- kexec: bail out upon SIGKILL when allocating memory (git-fixes).\n- KVM: Clean up __kvm_gfn_to_hva_cache_init() and its callers (bsc#1133021).\n- KVM: fix spectrev1 gadgets (bsc#1164705).\n- KVM: PPC: Book3S HV: Uninit vCPU if vcore creation fails (bsc#1061840).\n- KVM: PPC: Book3S PR: Fix -Werror=return-type build failure (bsc#1061840).\n- KVM: PPC: Book3S PR: Free shared page if mmu initialization fails (bsc#1061840).\n- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).\n- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).\n- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n- KVM: SVM: Override default MMIO mask if memory encryption is enabled (bsc#1162618).\n- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n- KVM: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).\n- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).\n- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).\n- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).\n- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).\n- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).\n- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).\n- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).\n- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).\n- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).\n- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).\n- KVM: x86: Remove a spurious export of a static function (bsc#1158954).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- lib: crc64: include \u003clinux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n- livepatch: Basic API to track system state changes (bsc#1071995 ).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n- livepatch: Simplify stack trace retrieval (jsc#SLE-11179).\n- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- mac80211: fix station inactive_time shortly after boot (bsc#1051510).\n- mac80211: Fix TKIP replay protection immediately after key setup (bsc#1051510).\n- mac80211: mesh: restrict airtime metric to peered established plinks (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).\n- media/v4l2-core: set pages dirty upon releasing DMA buffers (bsc#1051510).\n- media: af9005: uninitialized variable printked (bsc#1051510).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: CEC 2.0-only bcast messages were ignored (git-fixes).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: digitv: do not continue if remote control state can\u0027t be read (bsc#1051510).\n- media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0 (bsc#1051510).\n- media: exynos4-is: fix wrong mdev and v4l2 dev order in error path (git-fixes).\n- media: gspca: zero usb_buf (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov6650: Fix control handler not freed on init error (git-fixes).\n- media: ov6650: Fix crop rectangle alignment not passed back (git-fixes).\n- media: ov6650: Fix incorrect use of JPEG colorspace (git-fixes).\n- media: pulse8-cec: fix lost cec_transmit_attempt_done() call.\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media: uvcvideo: Fix error path in control parsing failure (git-fixes).\n- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- mei: bus: prefix device names on bus with the bus name (bsc#1051510).\n- mfd: da9062: Fix watchdog compatible string (bsc#1051510).\n- mfd: dln2: More sanity checking for endpoints (bsc#1051510).\n- mfd: rn5t618: Mark ADC control register volatile (bsc#1051510).\n- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b (\u0027rpm/kernel-subpackage-spec: Unify dependency handling.\u0027) Fixes: 3fd22e219f77 (\u0027rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\u0027)\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: Revert \u0027mmc: sdhci-of-esdhc: add erratum A-009204 support\u0027 (bsc#1051510).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: spi: Toggle SPI polarity, do not hardcode it (bsc#1051510).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- moduleparam: fix parameter description mismatch (bsc#1051510).\n- mod_devicetable: fix PHY module format (networking-stable-19_12_28).\n- mtd: fix mtd_oobavail() incoherent returned value (bsc#1051510).\n- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).\n- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1163851).\n- nbd: prevent memory leak (bsc#1158638).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n- net: dst: Force 4-byte alignment of dst_metrics (networking-stable-19_12_28).\n- net: ena: fix napi handler misbehavior when the napi budget is zero (networking-stable-20_01_01).\n- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n- net: hisilicon: Fix a BUG trigered by wrong bytes_compl (networking-stable-19_12_28).\n- net: nfc: nci: fix a possible sleep-in-atomic-context bug in nci_uart_tty_receive() (networking-stable-19_12_28).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).\n- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: Check against net_device being NULL (bsc#1051510).\n- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).\n- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).\n- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).\n- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).\n- net: phy: marvell: clear wol event before setting it (bsc#1051510).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: meson-gxl: check phy_write return value (bsc#1051510).\n- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: mscc: read \u0027vsc8531, edge-slowdown\u0027 as an u32 (bsc#1051510).\n- net: phy: mscc: read \u0027vsc8531,vddmac\u0027 as an u32 (bsc#1051510).\n- net: phy: xgene: disable clk on error paths (bsc#1051510).\n- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).\n- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).\n- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: qlogic: Fix error paths in ql_alloc_large_buffers() (networking-stable-19_12_28).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net: sched: correct flower port blocking (git-fixes).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net: usb: lan78xx: Fix suspend/resume PHY register access error (networking-stable-19_12_28).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- NFC: fdp: fix incorrect free object (networking-stable-19_11_10).\n- NFC: pn533: fix bulk-message timeout (bsc#1051510).\n- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- NFC: st21nfca: fix double free (networking-stable-19_11_10).\n- nvme: fix the parameter order for nvme_get_log in nvme_get_fw_slot_info (bsc#1163774).\n- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n- ocfs2: fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1158649).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- PCI/IOV: Fix memory leak in pci_iov_add_virtfn() (git-fixes).\n- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).\n- PCI/PTM: Remove spurious \u0027d\u0027 from granularity message (bsc#1051510).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- PCI: Add DMA alias quirk for Intel VCA NTB (bsc#1051510).\n- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n- PCI: tegra: Enable Relaxed Ordering only for Tegra20 \u0026 Tegra30 (git-fixes).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1114279).\n- perf/x86/intel: Fix inaccurate period in context switch for auto-reload (bsc#1164315).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).\n- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).\n- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).\n- power: supply: ltc2941-battery-gauge: fix use-after-free (bsc#1051510).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/livepatch: return -ERRNO values in save_stack_trace_tsk_reliable() (bsc#1071995 bsc#1161875).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/pseries/hotplug-memory: Change rc variable to bool (bsc#1065729).\n- powerpc/pseries/lparcfg: Fix display of Maximum Memory (bsc#1162028 ltc#181740).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/pseries/vio: Fix iommu_table use-after-free refcount warning (bsc#1065729).\n- powerpc/pseries: Advance pfn if section is not present in lmb_is_removable() (bsc#1065729).\n- powerpc/pseries: Allow not having ibm, hypertas-functions::hcall-multi-tce for DDW (bsc#1065729).\n- powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init() (git-fixes).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: avoid adjusting memory_limit for capture kernel memory reservation (bsc#1140025 ltc#176086).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- powerpc: reserve memory for capture kernel after hugepages init (bsc#1140025 ltc#176086).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- printk: Export console_printk (bsc#1071995).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- pwm: Clear chip_data in pwm_put() (bsc#1051510).\n- pwm: clps711x: Fix period calculation (bsc#1051510).\n- pwm: omap-dmtimer: Remove PWM chip in .remove before making it unfunctional (git-fixes).\n- pwm: Remove set but not set variable \u0027pwm\u0027 (git-fixes).\n- pxa168fb: Fix the function used to release some memory in an error (bsc#1114279)\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qede: Fix multicast mac configuration (networking-stable-19_12_28).\n- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).\n- qmi_wwan: Add support for Quectel RM500Q (bsc#1051510).\n- quota: Check that quota is not dirty before release (bsc#1163858).\n- quota: fix livelock in dquot_writeback_dquots (bsc#1163857).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- r8152: get default setting of WOL before initializing (bsc#1051510).\n- random: move FIPS continuous test to output functions (bsc#1155334).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- RDMA/hns: Prevent memory leaks of eq-\u003ebuf_list (bsc#1104427 ).\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- regulator: tps65910: fix a missing check of return value (bsc#1051510).\n- reiserfs: Fix memory leak of journal device string (bsc#1163867).\n- reiserfs: Fix spurious unlock in reiserfs_fill_super() error handling (bsc#1163869).\n- reset: fix reset_control_ops kerneldoc comment (bsc#1051510).\n- resource: fix locking in find_next_iomem_res() (bsc#1114279).\n- rpm/kabi.pl: support new (\u003e=5.4) Module.symvers format (new symbol namespace field)\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages\n- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n- rpm/kernel-subpackage-spec: fix kernel-default-base build There were some issues with recent changes to subpackage dependencies handling:\n- rpm/kernel-subpackage-spec: Unify dependency handling.\n- rpm/modules.fips: update module list (bsc#1157853)\n- rsi_91x_usb: fix interface sanity check (git-fixes).\n- rt2800: remove errornous duplicate condition (git-fixes).\n- rtc: cmos: Stop using shared IRQ (bsc#1051510).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: hym8563: Return -EINVAL if the time is known to be invalid (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in \u0027max8997_rtc_read_alarm()\u0027 (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf\u0027s type to u8 in s35390a_init (bsc#1051510).\n- rtl818x: fix potential use after free (bsc#1051510).\n- rtl8xxxu: fix interface sanity check (git-fixes).\n- rtlwifi: Fix MAX MPDU of VHT capability (git-fixes).\n- rtlwifi: Remove redundant semicolon in wifi.h (git-fixes).\n- s390/ftrace: generate traced function stack frame (jsc#SLE-11178 jsc#SLE-11179).\n- s390/ftrace: save traced function caller (jsc#SLE-11179).\n- s390/ftrace: use HAVE_FUNCTION_GRAPH_RET_ADDR_PTR (jsc#SLE-11179).\n- s390/head64: correct init_task stack setup (jsc#SLE-11179).\n- s390/kasan: avoid false positives during stack unwind (jsc#SLE-11179).\n- s390/kasan: avoid report in get_wchan (jsc#SLE-11179).\n- s390/livepatch: Implement reliable stack tracing for the consistency model (jsc#SLE-11179).\n- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n- s390/process: avoid custom stack unwinding in get_wchan (jsc#SLE-11179).\n- s390/qeth: clean up page frag creation (git-fixes).\n- s390/qeth: consolidate skb allocation (git-fixes).\n- s390/qeth: ensure linear access to packet headers (git-fixes).\n- s390/qeth: guard against runt packets (git-fixes).\n- s390/stacktrace: use common arch_stack_walk infrastructure (jsc#SLE-11179).\n- s390/suspend: fix stack setup in swsusp_arch_suspend (jsc#SLE-11179).\n- s390/test_unwind: print verbose unwinding results (jsc#SLE-11179).\n- s390/unwind: add stack pointer alignment sanity checks (jsc#SLE-11179).\n- s390/unwind: always inline get_stack_pointer (jsc#SLE-11179).\n- s390/unwind: avoid int overflow in outside_of_stack (jsc#SLE-11179).\n- s390/unwind: cleanup unused READ_ONCE_TASK_STACK (jsc#SLE-11179).\n- s390/unwind: correct stack switching during unwind (jsc#SLE-11179).\n- s390/unwind: drop unnecessary code around calling ftrace_graph_ret_addr() (jsc#SLE-11179).\n- s390/unwind: filter out unreliable bogus %r14 (jsc#SLE-11179).\n- s390/unwind: fix get_stack_pointer(NULL, NULL) (jsc#SLE-11179).\n- s390/unwind: fix mixing regs and sp (jsc#SLE-11179).\n- s390/unwind: introduce stack unwind API (jsc#SLE-11179).\n- s390/unwind: make reuse_sp default when unwinding pt_regs (jsc#SLE-11179).\n- s390/unwind: remove stack recursion warning (jsc#SLE-11179).\n- s390/unwind: report an error if pt_regs are not on stack (jsc#SLE-11179).\n- s390/unwind: start unwinding from reliable state (jsc#SLE-11179).\n- s390/unwind: stop gracefully at task pt_regs (jsc#SLE-11179).\n- s390/unwind: stop gracefully at user mode pt_regs in irq stack (jsc#SLE-11179).\n- s390/unwind: unify task is current checks (jsc#SLE-11179).\n- s390: add stack switch helper (jsc#SLE-11179).\n- s390: add support for virtually mapped kernel stacks (jsc#SLE-11179).\n- s390: always inline current_stack_pointer() (jsc#SLE-11179).\n- s390: always inline disabled_wait (jsc#SLE-11179).\n- s390: avoid misusing CALL_ON_STACK for task stack setup (jsc#SLE-11179).\n- s390: clean up stacks setup (jsc#SLE-11179).\n- s390: correct CALL_ON_STACK back_chain saving (jsc#SLE-11179).\n- s390: disable preemption when switching to nodat stack with CALL_ON_STACK (jsc#SLE-11179).\n- s390: fine-tune stack switch helper (jsc#SLE-11179).\n- s390: fix register clobbering in CALL_ON_STACK (jsc#SLE-11179).\n- s390: kabi workaround for ftrace_ret_stack (jsc#SLE-11179).\n- s390: kabi workaround for lowcore changes due to vmap stack (jsc#SLE-11179).\n- s390: kabi workaround for reliable stack tracing (jsc#SLE-11179).\n- s390: preserve kabi for stack unwind API (jsc#SLE-11179).\n- s390: unify stack size definitions (jsc#SLE-11179).\n- sched/fair: Add tmp_alone_branch assertion (bnc#1156462).\n- sched/fair: Fix insertion in rq-\u003eleaf_cfs_rq_list (bnc#1156462).\n- sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).\n- sched/fair: Optimize update_blocked_averages() (bnc#1156462).\n- sched/fair: WARN() and refuse to set buddy when !se-\u003eon_rq (bsc#1158132).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Correctly retrieve and interpret active flash region (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix a NULL pointer dereference in an error path (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix unbound NVME response length (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- scsi: zfcp: trace channel log even for FCP command responses (git-fixes).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- sctp: fully initialize v4 addr in some functions (networking-stable-19_12_28).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: max310x: Fix tx_empty() callback (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- smb3: Fix persistent handles reconnect (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: remove confusing dmesg when mounting with encryption (\u0027seal\u0027) (bsc#1144333).\n- soc/tegra: fuse: Correct straps\u0027 address for older Tegra124 device trees (bsc#1051510).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- soc: ti: wkup_m3_ipc: Fix race condition with rproc_boot (bsc#1051510).\n- spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch (bsc#1051510).\n- spi: omap2-mcspi: Set FIFO DMA trigger level to word length (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- sr_vendor: support Beurer GL50 evo CD-on-a-chip devices (boo#1164632).\n- stacktrace: Do not skip first entry on noncurrent tasks (jsc#SLE-11179).\n- stacktrace: Force USER_DS for stack_trace_save_user() (jsc#SLE-11179).\n- stacktrace: Get rid of unneeded \u0027!!\u0027 pattern (jsc#SLE-11179).\n- stacktrace: Provide common infrastructure (jsc#SLE-11179).\n- stacktrace: Provide helpers for common stack trace operations (jsc#SLE-11179).\n- stacktrace: Unbreak stack_trace_save_tsk_reliable() (jsc#SLE-11179).\n- stacktrace: Use PF_KTHREAD to check for kernel threads (jsc#SLE-11179).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: rtl8192e: fix potential use after free (bsc#1051510).\n- staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids (bsc#1051510).\n- staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).\n- staging: vt6656: correct packet types for CTS protect, mode (bsc#1051510).\n- staging: vt6656: Fix false Tx excessive retries reporting (bsc#1051510).\n- staging: vt6656: use NULLFUCTION stack on mac80211 (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- stm class: Fix a double free of stm_source_device (bsc#1051510).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810, bsc#1161702).\n- stop_machine: Atomically queue and wake stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption after queueing stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption when waking two stopper threads (bsc#1088810, bsc#1161702).\n- supported.conf:\n- synclink_gt(): fix compat_ioctl() (bsc#1051510).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1160560).\n- tcp: do not send empty skb from tcp_write_xmit() (networking-stable-20_01_01).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n- thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).\n- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: check msg-\u003ereq data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n- tipc: compat: allow tipc commands without arguments (bsc#1051510).\n- tipc: fix a missing check of genlmsg_put (bsc#1051510).\n- tipc: fix link name length check (bsc#1051510).\n- tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).\n- tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).\n- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n- tipc: handle the err returned from cmd header function (bsc#1051510).\n- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n- tipc: tipc clang warning (bsc#1051510).\n- tracing: Annotate ftrace_graph_hash pointer with __rcu (git-fixes).\n- tracing: Annotate ftrace_graph_notrace_hash pointer with __rcu (git-fixes).\n- tracing: Cleanup stack trace code (jsc#SLE-11179).\n- tracing: Fix tracing_stat return values in error handling paths (git-fixes).\n- tracing: Fix very unlikely race of registering two stat tracers (git-fixes).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: msm_serial: Fix flow control (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- uaccess: Add non-pagefault user-space write function (bsc#1083647).\n- ubifs: Correctly initialize c-\u003emin_log_bytes (bsc#1158641).\n- ubifs: do not trigger assertion on invalid no-key filename (bsc#1163850).\n- ubifs: Fix deadlock in concurrent bulk-read and writepage (bsc#1163856).\n- ubifs: Fix FS_IOC_SETFLAGS unexpectedly clearing encrypt flag (bsc#1163855).\n- ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n- ubifs: Reject unsupported ioctl flags explicitly (bsc#1163844).\n- udp: fix integer overflow while computing available space in sk_rcvbuf (networking-stable-20_01_01).\n- usb-storage: Disable UAS on JMicron SATA enclosure (bsc#1051510).\n- usb: adutux: fix interface sanity check (bsc#1051510).\n- usb: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- usb: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- usb: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- usb: core: fix check for duplicate endpoints (git-fixes).\n- usb: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- usb: core: urb: fix URB structure initialization function (bsc#1051510).\n- usb: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- usb: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- usb: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- usb: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- usb: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- usb: EHCI: Do not return -EPIPE when hub is disconnected (git-fixes).\n- usb: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).\n- usb: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- usb: gadget: legacy: set max_speed to super-speed (bsc#1051510).\n- usb: gadget: pch_udc: fix use after free (bsc#1051510).\n- usb: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- usb: gadget: Zero ffs_io_data (bsc#1051510).\n- usb: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- usb: idmouse: fix interface sanity checks (bsc#1051510).\n- usb: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n- usb: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n- usb: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- usb: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- usb: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- usb: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).\n- usb: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- usb: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n- usb: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- usb: serial: io_edgeport: use irqsave() in USB\u0027s complete callback (bsc#1051510).\n- usb: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- usb: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- usb: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- usb: serial: keyspan: handle unbound ports (bsc#1051510).\n- usb: serial: opticon: fix control-message timeouts (bsc#1051510).\n- usb: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- usb: serial: option: add support for Quectel RM500Q in QDL mode (git-fixes).\n- usb: serial: option: add Telit ME910G1 0x110a composition (git-fixes).\n- usb: serial: option: add ZLP support for 0x1bc7/0x9010 (git-fixes).\n- usb: serial: quatech2: handle unbound ports (bsc#1051510).\n- usb: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- usb: serial: suppress driver bind attributes (bsc#1051510).\n- usb: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- usb: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- usb: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- usb: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- usb: xhci: only set D3hot for pci device (bsc#1051510).\n- usbip: Fix error path of vhci_recv_ret_submit() (git-fixes).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1 (bsc#1051510).\n- vhost/vsock: accept only packets with the right dst_cid (networking-stable-20_01_01).\n- video: backlight: Add devres versions of of_find_backlight (bsc#1090888) Taken for 6010831dde5.\n- video: backlight: Add of_find_backlight helper in backlight.c (bsc#1090888) Taken for 6010831dde5.\n- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n- watchdog: max77620_wdt: fix potential build errors (bsc#1051510).\n- watchdog: rn5t618_wdt: fix module aliases (bsc#1051510).\n- watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).\n- watchdog: wdat_wdt: fix get_timeleft call for wdat_wdt (bsc#1162557).\n- wireless: fix enabling channel 12 for custom regulatory domain (bsc#1051510).\n- wireless: wext: avoid gcc -O3 warning (bsc#1051510).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/cpu: Update cached HLE state on write to TSX_CTRL_CPUID_CLEAR (bsc#1162619).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/resctrl: Check monitoring static key in the MBM overflow handler (bsc#1114279).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free when deleting resource groups (bsc#1114279).\n- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xen/balloon: Support xend-based toolstack take two (bsc#1065600).\n- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xen: Enable interrupts when calling _cond_resched() (bsc#1065600).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-584,SUSE-SLE-HA-12-SP4-2020-584,SUSE-SLE-Live-Patching-12-SP4-2020-584,SUSE-SLE-SDK-12-SP4-2020-584,SUSE-SLE-SERVER-12-SP4-2020-584,SUSE-SLE-WE-12-SP4-2020-584",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0584-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:0584-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200584-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:0584-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1046303",
        "url": "https://bugzilla.suse.com/1046303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050244",
        "url": "https://bugzilla.suse.com/1050244"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051858",
        "url": "https://bugzilla.suse.com/1051858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061840",
        "url": "https://bugzilla.suse.com/1061840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1083647",
        "url": "https://bugzilla.suse.com/1083647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085030",
        "url": "https://bugzilla.suse.com/1085030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086301",
        "url": "https://bugzilla.suse.com/1086301"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086313",
        "url": "https://bugzilla.suse.com/1086313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086314",
        "url": "https://bugzilla.suse.com/1086314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088810",
        "url": "https://bugzilla.suse.com/1088810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1090888",
        "url": "https://bugzilla.suse.com/1090888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104427",
        "url": "https://bugzilla.suse.com/1104427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1105392",
        "url": "https://bugzilla.suse.com/1105392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111666",
        "url": "https://bugzilla.suse.com/1111666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112504",
        "url": "https://bugzilla.suse.com/1112504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1115026",
        "url": "https://bugzilla.suse.com/1115026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118338",
        "url": "https://bugzilla.suse.com/1118338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1120853",
        "url": "https://bugzilla.suse.com/1120853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1123328",
        "url": "https://bugzilla.suse.com/1123328"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127371",
        "url": "https://bugzilla.suse.com/1127371"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133147",
        "url": "https://bugzilla.suse.com/1133147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1134973",
        "url": "https://bugzilla.suse.com/1134973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1140025",
        "url": "https://bugzilla.suse.com/1140025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1141054",
        "url": "https://bugzilla.suse.com/1141054"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1142095",
        "url": "https://bugzilla.suse.com/1142095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1143959",
        "url": "https://bugzilla.suse.com/1143959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144333",
        "url": "https://bugzilla.suse.com/1144333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146519",
        "url": "https://bugzilla.suse.com/1146519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146544",
        "url": "https://bugzilla.suse.com/1146544"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151548",
        "url": "https://bugzilla.suse.com/1151548"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151910",
        "url": "https://bugzilla.suse.com/1151910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151927",
        "url": "https://bugzilla.suse.com/1151927"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152631",
        "url": "https://bugzilla.suse.com/1152631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153917",
        "url": "https://bugzilla.suse.com/1153917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154243",
        "url": "https://bugzilla.suse.com/1154243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155331",
        "url": "https://bugzilla.suse.com/1155331"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155334",
        "url": "https://bugzilla.suse.com/1155334"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155689",
        "url": "https://bugzilla.suse.com/1155689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156259",
        "url": "https://bugzilla.suse.com/1156259"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156286",
        "url": "https://bugzilla.suse.com/1156286"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156462",
        "url": "https://bugzilla.suse.com/1156462"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157155",
        "url": "https://bugzilla.suse.com/1157155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157157",
        "url": "https://bugzilla.suse.com/1157157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157169",
        "url": "https://bugzilla.suse.com/1157169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157303",
        "url": "https://bugzilla.suse.com/1157303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157424",
        "url": "https://bugzilla.suse.com/1157424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157692",
        "url": "https://bugzilla.suse.com/1157692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157853",
        "url": "https://bugzilla.suse.com/1157853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157908",
        "url": "https://bugzilla.suse.com/1157908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157966",
        "url": "https://bugzilla.suse.com/1157966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158013",
        "url": "https://bugzilla.suse.com/1158013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158021",
        "url": "https://bugzilla.suse.com/1158021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158026",
        "url": "https://bugzilla.suse.com/1158026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158094",
        "url": "https://bugzilla.suse.com/1158094"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158132",
        "url": "https://bugzilla.suse.com/1158132"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158381",
        "url": "https://bugzilla.suse.com/1158381"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158394",
        "url": "https://bugzilla.suse.com/1158394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158398",
        "url": "https://bugzilla.suse.com/1158398"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158407",
        "url": "https://bugzilla.suse.com/1158407"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158410",
        "url": "https://bugzilla.suse.com/1158410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158413",
        "url": "https://bugzilla.suse.com/1158413"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158417",
        "url": "https://bugzilla.suse.com/1158417"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158427",
        "url": "https://bugzilla.suse.com/1158427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158445",
        "url": "https://bugzilla.suse.com/1158445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158533",
        "url": "https://bugzilla.suse.com/1158533"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158637",
        "url": "https://bugzilla.suse.com/1158637"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158638",
        "url": "https://bugzilla.suse.com/1158638"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158639",
        "url": "https://bugzilla.suse.com/1158639"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158640",
        "url": "https://bugzilla.suse.com/1158640"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158641",
        "url": "https://bugzilla.suse.com/1158641"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158643",
        "url": "https://bugzilla.suse.com/1158643"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158644",
        "url": "https://bugzilla.suse.com/1158644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158645",
        "url": "https://bugzilla.suse.com/1158645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158646",
        "url": "https://bugzilla.suse.com/1158646"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158647",
        "url": "https://bugzilla.suse.com/1158647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158649",
        "url": "https://bugzilla.suse.com/1158649"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158651",
        "url": "https://bugzilla.suse.com/1158651"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158652",
        "url": "https://bugzilla.suse.com/1158652"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158819",
        "url": "https://bugzilla.suse.com/1158819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158823",
        "url": "https://bugzilla.suse.com/1158823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158824",
        "url": "https://bugzilla.suse.com/1158824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158827",
        "url": "https://bugzilla.suse.com/1158827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158834",
        "url": "https://bugzilla.suse.com/1158834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158893",
        "url": "https://bugzilla.suse.com/1158893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158900",
        "url": "https://bugzilla.suse.com/1158900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158903",
        "url": "https://bugzilla.suse.com/1158903"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158904",
        "url": "https://bugzilla.suse.com/1158904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158954",
        "url": "https://bugzilla.suse.com/1158954"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159024",
        "url": "https://bugzilla.suse.com/1159024"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159028",
        "url": "https://bugzilla.suse.com/1159028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159271",
        "url": "https://bugzilla.suse.com/1159271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159297",
        "url": "https://bugzilla.suse.com/1159297"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159394",
        "url": "https://bugzilla.suse.com/1159394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159483",
        "url": "https://bugzilla.suse.com/1159483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159484",
        "url": "https://bugzilla.suse.com/1159484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159569",
        "url": "https://bugzilla.suse.com/1159569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159588",
        "url": "https://bugzilla.suse.com/1159588"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159841",
        "url": "https://bugzilla.suse.com/1159841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159908",
        "url": "https://bugzilla.suse.com/1159908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159909",
        "url": "https://bugzilla.suse.com/1159909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159910",
        "url": "https://bugzilla.suse.com/1159910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159911",
        "url": "https://bugzilla.suse.com/1159911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159955",
        "url": "https://bugzilla.suse.com/1159955"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160195",
        "url": "https://bugzilla.suse.com/1160195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160210",
        "url": "https://bugzilla.suse.com/1160210"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160211",
        "url": "https://bugzilla.suse.com/1160211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160218",
        "url": "https://bugzilla.suse.com/1160218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160433",
        "url": "https://bugzilla.suse.com/1160433"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160442",
        "url": "https://bugzilla.suse.com/1160442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160476",
        "url": "https://bugzilla.suse.com/1160476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160560",
        "url": "https://bugzilla.suse.com/1160560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160755",
        "url": "https://bugzilla.suse.com/1160755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160756",
        "url": "https://bugzilla.suse.com/1160756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160784",
        "url": "https://bugzilla.suse.com/1160784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160787",
        "url": "https://bugzilla.suse.com/1160787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160802",
        "url": "https://bugzilla.suse.com/1160802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160803",
        "url": "https://bugzilla.suse.com/1160803"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160804",
        "url": "https://bugzilla.suse.com/1160804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160917",
        "url": "https://bugzilla.suse.com/1160917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160966",
        "url": "https://bugzilla.suse.com/1160966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160979",
        "url": "https://bugzilla.suse.com/1160979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161087",
        "url": "https://bugzilla.suse.com/1161087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161360",
        "url": "https://bugzilla.suse.com/1161360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161514",
        "url": "https://bugzilla.suse.com/1161514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161518",
        "url": "https://bugzilla.suse.com/1161518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161522",
        "url": "https://bugzilla.suse.com/1161522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161523",
        "url": "https://bugzilla.suse.com/1161523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161549",
        "url": "https://bugzilla.suse.com/1161549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161552",
        "url": "https://bugzilla.suse.com/1161552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161674",
        "url": "https://bugzilla.suse.com/1161674"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161702",
        "url": "https://bugzilla.suse.com/1161702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161875",
        "url": "https://bugzilla.suse.com/1161875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161907",
        "url": "https://bugzilla.suse.com/1161907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161931",
        "url": "https://bugzilla.suse.com/1161931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161933",
        "url": "https://bugzilla.suse.com/1161933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161934",
        "url": "https://bugzilla.suse.com/1161934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161935",
        "url": "https://bugzilla.suse.com/1161935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161936",
        "url": "https://bugzilla.suse.com/1161936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161937",
        "url": "https://bugzilla.suse.com/1161937"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162028",
        "url": "https://bugzilla.suse.com/1162028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162067",
        "url": "https://bugzilla.suse.com/1162067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162109",
        "url": "https://bugzilla.suse.com/1162109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162139",
        "url": "https://bugzilla.suse.com/1162139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162557",
        "url": "https://bugzilla.suse.com/1162557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162617",
        "url": "https://bugzilla.suse.com/1162617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162618",
        "url": "https://bugzilla.suse.com/1162618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162619",
        "url": "https://bugzilla.suse.com/1162619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162623",
        "url": "https://bugzilla.suse.com/1162623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162943",
        "url": "https://bugzilla.suse.com/1162943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163383",
        "url": "https://bugzilla.suse.com/1163383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163384",
        "url": "https://bugzilla.suse.com/1163384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163762",
        "url": "https://bugzilla.suse.com/1163762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163774",
        "url": "https://bugzilla.suse.com/1163774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163836",
        "url": "https://bugzilla.suse.com/1163836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163840",
        "url": "https://bugzilla.suse.com/1163840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163841",
        "url": "https://bugzilla.suse.com/1163841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163842",
        "url": "https://bugzilla.suse.com/1163842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163843",
        "url": "https://bugzilla.suse.com/1163843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163844",
        "url": "https://bugzilla.suse.com/1163844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163845",
        "url": "https://bugzilla.suse.com/1163845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163846",
        "url": "https://bugzilla.suse.com/1163846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163849",
        "url": "https://bugzilla.suse.com/1163849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163850",
        "url": "https://bugzilla.suse.com/1163850"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163851",
        "url": "https://bugzilla.suse.com/1163851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163852",
        "url": "https://bugzilla.suse.com/1163852"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163853",
        "url": "https://bugzilla.suse.com/1163853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163855",
        "url": "https://bugzilla.suse.com/1163855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163856",
        "url": "https://bugzilla.suse.com/1163856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163857",
        "url": "https://bugzilla.suse.com/1163857"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163858",
        "url": "https://bugzilla.suse.com/1163858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163859",
        "url": "https://bugzilla.suse.com/1163859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163860",
        "url": "https://bugzilla.suse.com/1163860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163861",
        "url": "https://bugzilla.suse.com/1163861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163862",
        "url": "https://bugzilla.suse.com/1163862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163863",
        "url": "https://bugzilla.suse.com/1163863"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163867",
        "url": "https://bugzilla.suse.com/1163867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163869",
        "url": "https://bugzilla.suse.com/1163869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163880",
        "url": "https://bugzilla.suse.com/1163880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163971",
        "url": "https://bugzilla.suse.com/1163971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164069",
        "url": "https://bugzilla.suse.com/1164069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164098",
        "url": "https://bugzilla.suse.com/1164098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164115",
        "url": "https://bugzilla.suse.com/1164115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164314",
        "url": "https://bugzilla.suse.com/1164314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164315",
        "url": "https://bugzilla.suse.com/1164315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164388",
        "url": "https://bugzilla.suse.com/1164388"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164471",
        "url": "https://bugzilla.suse.com/1164471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164632",
        "url": "https://bugzilla.suse.com/1164632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164705",
        "url": "https://bugzilla.suse.com/1164705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164712",
        "url": "https://bugzilla.suse.com/1164712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164727",
        "url": "https://bugzilla.suse.com/1164727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164728",
        "url": "https://bugzilla.suse.com/1164728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164729",
        "url": "https://bugzilla.suse.com/1164729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164730",
        "url": "https://bugzilla.suse.com/1164730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164731",
        "url": "https://bugzilla.suse.com/1164731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164732",
        "url": "https://bugzilla.suse.com/1164732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164733",
        "url": "https://bugzilla.suse.com/1164733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164734",
        "url": "https://bugzilla.suse.com/1164734"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164735",
        "url": "https://bugzilla.suse.com/1164735"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14615 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14897 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15213 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15213/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16994 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16994/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18808 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19036 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19045 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19051 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19066 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19318 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19318/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19319 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19319/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19332 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19332/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19338 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19338/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19447 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19447/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19523 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19523/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19524 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19524/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19525 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19525/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19526 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19526/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19527 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19527/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19528 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19528/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19529 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19529/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19530 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19530/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19531 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19531/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19532 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19532/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19533 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19533/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19534 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19534/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19535 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19535/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19536 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19536/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19537 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19537/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19543 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19767 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19965 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19966 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20095 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20096 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-7053 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-7053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8428 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8428/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-03-04T10:57:19Z",
      "generator": {
        "date": "2020-03-04T10:57:19Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:0584-1",
      "initial_release_date": "2020-03-04T10:57:19Z",
      "revision_history": [
        {
          "date": "2020-03-04T10:57:19Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-95.48.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-95.48.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-95.48.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-default-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-default-kgraft-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-95.48.1.aarch64",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-95.48.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-95.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-95.48.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-95.48.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-95.48.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-95.48.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-95.48.1.noarch",
                  "product_id": "kernel-devel-4.12.14-95.48.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-95.48.1.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-95.48.1.noarch",
                  "product_id": "kernel-docs-4.12.14-95.48.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-95.48.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-95.48.1.noarch",
                  "product_id": "kernel-docs-html-4.12.14-95.48.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-95.48.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-95.48.1.noarch",
                  "product_id": "kernel-macros-4.12.14-95.48.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-95.48.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-95.48.1.noarch",
                  "product_id": "kernel-source-4.12.14-95.48.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-95.48.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-95.48.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-95.48.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-95.48.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-debug-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-devel-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-debug-kgraft-devel-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-debug-kgraft-devel-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-default-kgraft-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-95.48.1.ppc64le",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-95.48.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-95.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-95.48.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-95.48.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-95.48.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-95.48.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-default-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-default-kgraft-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-syms-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-95.48.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-95.48.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-95.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-95.48.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-95.48.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-95.48.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-95.48.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-95.48.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-debug-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-devel-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-debug-kgraft-devel-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-debug-kgraft-devel-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-default-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-default-kgraft-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-95.48.1.x86_64",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-95.48.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-95.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-95.48.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP4",
                  "product_id": "SUSE Linux Enterprise Server 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:12:sp4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-95.48.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-95.48.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-95.48.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-95.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x"
        },
        "product_reference": "kernel-obs-build-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-95.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-95.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-95.48.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-95.48.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-95.48.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-95.48.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-95.48.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-95.48.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-95.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.48.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-95.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.48.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-95.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.48.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-95.48.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-95.48.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-95.48.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-95.48.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-95.48.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-95.48.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.48.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-95.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-95.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-95.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-4.12.14-95.48.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4",
          "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        },
        "product_reference": "kernel-default-extra-4.12.14-95.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-14615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14615",
          "url": "https://www.suse.com/security/cve/CVE-2019-14615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160195 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1160195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165881 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1165881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14615"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-14897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14897",
          "url": "https://www.suse.com/security/cve/CVE-2019-14897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157155 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1157155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160467 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14897"
    },
    {
      "cve": "CVE-2019-15213",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15213"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15213",
          "url": "https://www.suse.com/security/cve/CVE-2019-15213"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1146519"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146544 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1146544"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15213"
    },
    {
      "cve": "CVE-2019-16994",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16994"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16994",
          "url": "https://www.suse.com/security/cve/CVE-2019-16994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161523 for CVE-2019-16994",
          "url": "https://bugzilla.suse.com/1161523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16994"
    },
    {
      "cve": "CVE-2019-18808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18808",
          "url": "https://www.suse.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156259 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1156259"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18808"
    },
    {
      "cve": "CVE-2019-19036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19036",
          "url": "https://www.suse.com/security/cve/CVE-2019-19036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157692 for CVE-2019-19036",
          "url": "https://bugzilla.suse.com/1157692"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19036"
    },
    {
      "cve": "CVE-2019-19045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19045",
          "url": "https://www.suse.com/security/cve/CVE-2019-19045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161522 for CVE-2019-19045",
          "url": "https://bugzilla.suse.com/1161522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19045"
    },
    {
      "cve": "CVE-2019-19051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19051",
          "url": "https://www.suse.com/security/cve/CVE-2019-19051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159024 for CVE-2019-19051",
          "url": "https://bugzilla.suse.com/1159024"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19051"
    },
    {
      "cve": "CVE-2019-19054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19054",
          "url": "https://www.suse.com/security/cve/CVE-2019-19054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161518 for CVE-2019-19054",
          "url": "https://bugzilla.suse.com/1161518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19054"
    },
    {
      "cve": "CVE-2019-19066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19066",
          "url": "https://www.suse.com/security/cve/CVE-2019-19066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157303 for CVE-2019-19066",
          "url": "https://bugzilla.suse.com/1157303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19066"
    },
    {
      "cve": "CVE-2019-19318",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19318"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19318",
          "url": "https://www.suse.com/security/cve/CVE-2019-19318"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158026 for CVE-2019-19318",
          "url": "https://bugzilla.suse.com/1158026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19318"
    },
    {
      "cve": "CVE-2019-19319",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19319"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19319",
          "url": "https://www.suse.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158021 for CVE-2019-19319",
          "url": "https://bugzilla.suse.com/1158021"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19319"
    },
    {
      "cve": "CVE-2019-19332",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19332"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19332",
          "url": "https://www.suse.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158827 for CVE-2019-19332",
          "url": "https://bugzilla.suse.com/1158827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19332"
    },
    {
      "cve": "CVE-2019-19338",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19338"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19338",
          "url": "https://www.suse.com/security/cve/CVE-2019-19338"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158954 for CVE-2019-19338",
          "url": "https://bugzilla.suse.com/1158954"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19338"
    },
    {
      "cve": "CVE-2019-19447",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19447"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19447",
          "url": "https://www.suse.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158819 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1158819"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173869 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1173869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-19447"
    },
    {
      "cve": "CVE-2019-19523",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19523"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19523",
          "url": "https://www.suse.com/security/cve/CVE-2019-19523"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158823 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19523"
    },
    {
      "cve": "CVE-2019-19524",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19524"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19524",
          "url": "https://www.suse.com/security/cve/CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19524",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158413 for CVE-2019-19524",
          "url": "https://bugzilla.suse.com/1158413"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19524",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19524"
    },
    {
      "cve": "CVE-2019-19525",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19525"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19525",
          "url": "https://www.suse.com/security/cve/CVE-2019-19525"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19525",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158417 for CVE-2019-19525",
          "url": "https://bugzilla.suse.com/1158417"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19525",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19525"
    },
    {
      "cve": "CVE-2019-19526",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19526"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19526",
          "url": "https://www.suse.com/security/cve/CVE-2019-19526"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19526",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19526",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158893 for CVE-2019-19526",
          "url": "https://bugzilla.suse.com/1158893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19526"
    },
    {
      "cve": "CVE-2019-19527",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19527"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19527",
          "url": "https://www.suse.com/security/cve/CVE-2019-19527"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158900 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19527"
    },
    {
      "cve": "CVE-2019-19528",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19528"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19528",
          "url": "https://www.suse.com/security/cve/CVE-2019-19528"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19528",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158407 for CVE-2019-19528",
          "url": "https://bugzilla.suse.com/1158407"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19528",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19528"
    },
    {
      "cve": "CVE-2019-19529",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19529"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19529",
          "url": "https://www.suse.com/security/cve/CVE-2019-19529"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19529",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19529",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19529"
    },
    {
      "cve": "CVE-2019-19530",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19530"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19530",
          "url": "https://www.suse.com/security/cve/CVE-2019-19530"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19530",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158410 for CVE-2019-19530",
          "url": "https://bugzilla.suse.com/1158410"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19530",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19530"
    },
    {
      "cve": "CVE-2019-19531",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19531"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19531",
          "url": "https://www.suse.com/security/cve/CVE-2019-19531"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19531",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158427 for CVE-2019-19531",
          "url": "https://bugzilla.suse.com/1158427"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158445 for CVE-2019-19531",
          "url": "https://bugzilla.suse.com/1158445"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19531",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19531"
    },
    {
      "cve": "CVE-2019-19532",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19532"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19532",
          "url": "https://www.suse.com/security/cve/CVE-2019-19532"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158823 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158824 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19532"
    },
    {
      "cve": "CVE-2019-19533",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19533"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19533",
          "url": "https://www.suse.com/security/cve/CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19533",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19533",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19533"
    },
    {
      "cve": "CVE-2019-19534",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19534"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19534",
          "url": "https://www.suse.com/security/cve/CVE-2019-19534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19534",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158398 for CVE-2019-19534",
          "url": "https://bugzilla.suse.com/1158398"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19534",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19534"
    },
    {
      "cve": "CVE-2019-19535",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19535"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19535",
          "url": "https://www.suse.com/security/cve/CVE-2019-19535"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158903 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19535"
    },
    {
      "cve": "CVE-2019-19536",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19536"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19536",
          "url": "https://www.suse.com/security/cve/CVE-2019-19536"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19536",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158394 for CVE-2019-19536",
          "url": "https://bugzilla.suse.com/1158394"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19536",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19536"
    },
    {
      "cve": "CVE-2019-19537",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19537"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19537",
          "url": "https://www.suse.com/security/cve/CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158904 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158904"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19537"
    },
    {
      "cve": "CVE-2019-19543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19543",
          "url": "https://www.suse.com/security/cve/CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158427 for CVE-2019-19543",
          "url": "https://bugzilla.suse.com/1158427"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19543"
    },
    {
      "cve": "CVE-2019-19767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19767",
          "url": "https://www.suse.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159297 for CVE-2019-19767",
          "url": "https://bugzilla.suse.com/1159297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19767"
    },
    {
      "cve": "CVE-2019-19965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19965",
          "url": "https://www.suse.com/security/cve/CVE-2019-19965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159911 for CVE-2019-19965",
          "url": "https://bugzilla.suse.com/1159911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19965"
    },
    {
      "cve": "CVE-2019-19966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19966",
          "url": "https://www.suse.com/security/cve/CVE-2019-19966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159841 for CVE-2019-19966",
          "url": "https://bugzilla.suse.com/1159841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19966"
    },
    {
      "cve": "CVE-2019-20054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20054",
          "url": "https://www.suse.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159910 for CVE-2019-20054",
          "url": "https://bugzilla.suse.com/1159910"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20054"
    },
    {
      "cve": "CVE-2019-20095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20095",
          "url": "https://www.suse.com/security/cve/CVE-2019-20095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159909 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159914 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-20095"
    },
    {
      "cve": "CVE-2019-20096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20096",
          "url": "https://www.suse.com/security/cve/CVE-2019-20096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159908 for CVE-2019-20096",
          "url": "https://bugzilla.suse.com/1159908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20096"
    },
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-7053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-7053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-7053",
          "url": "https://www.suse.com/security/cve/CVE-2020-7053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160966 for CVE-2020-7053",
          "url": "https://bugzilla.suse.com/1160966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-7053"
    },
    {
      "cve": "CVE-2020-8428",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8428"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8428",
          "url": "https://www.suse.com/security/cve/CVE-2020-8428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162109 for CVE-2020-8428",
          "url": "https://bugzilla.suse.com/1162109"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8428"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_48-default-1-6.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.48.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.48.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T10:57:19Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    }
  ]
}
  suse-su-2020:0836-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15-SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-8647: Fixed a use-after-free in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).\n- CVE-2020-8649: Fixed a use-after-free in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).\n- CVE-2020-8648: Fixed a use-after-free in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).\n- CVE-2020-9383: Fixed an out-of-bounds read due to improper error condition check of FDC index (bsc#1165111).\n- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/realtek - Add Headset Button supported for ThinkPad X1 (bsc#1111666).\n- ALSA: hda/realtek - Add Headset Mic supported (bsc#1111666).\n- ALSA: hda/realtek - Add more codec supported Headset Button (bsc#1111666).\n- ALSA: hda/realtek - Apply quirk for MSI GP63, too (bsc#1111666).\n- ALSA: hda/realtek - Apply quirk for yet another MSI laptop (bsc#1111666).\n- ALSA: hda/realtek - Enable the headset of ASUS B9450FA with ALC294 (bsc#1111666).\n- ALSA: hda/realtek - Fix a regression for mute led on Lenovo Carbon X1 (bsc#1111666).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Master (bsc#1111666).\n- ALSA: usb-audio: Add boot quirk for MOTU M Series (bsc#1111666).\n- ALSA: usb-audio: Add clock validity quirk for Denon MC7000/MCX8000 (bsc#1111666).\n- ALSA: usb-audio: add implicit fb quirk for MOTU M Series (bsc#1111666).\n- ALSA: usb-audio: add quirks for Line6 Helix devices fw\u003e=2.82 (bsc#1111666).\n- ALSA: usb-audio: Apply 48kHz fixed rate playback for Jabra Evolve 65 headset (bsc#1111666).\n- ALSA: usb-audio: fix Corsair Virtuoso mixer label collision (bsc#1111666).\n- ALSA: usb-audio: Fix UAC2/3 effect unit parsing (bsc#1111666).\n- ALSA: usb-audio: unlock on error in probe (bsc#1111666).\n- ALSA: usb-audio: Use lower hex numbers for IDs (bsc#1111666).\n- ALSA: usx2y: Adjust indentation in snd_usX2Y_hwdep_dsp_status (bsc#1051510).\n- amdgpu/gmc_v9: save/restore sdpif regs during S3 (bsc#1113956)\n- ASoC: dapm: Correct DAPM handling of active widgets during shutdown (bsc#1051510).\n- ASoC: pcm512x: Fix unbalanced regulator enable call in probe error path (bsc#1051510).\n- ASoC: pcm: Fix possible buffer overflow in dpcm state sysfs output (bsc#1051510).\n- ASoC: pcm: update FE/BE trigger order based on the command (bsc#1051510).\n- ASoC: topology: Fix memleak in soc_tplg_link_elems_load() (bsc#1051510).\n- atm: zatm: Fix empty body Clang warnings (bsc#1051510).\n- b43legacy: Fix -Wcast-function-type (bsc#1051510).\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- bnxt_en: Fix NTUPLE firmware command failures (bsc#1104745 ).\n- bnxt_en: Fix TC queue mapping (networking-stable-20_02_05).\n- bnxt_en: Improve device shutdown method (bsc#1104745 ).\n- bnxt_en: Issue PCIe FLR in kdump kernel to cleanup pending DMAs (bsc#1134090 jsc#SLE-5954).\n- bonding/alb: properly access headers in bond_alb_xmit() (networking-stable-20_02_09).\n- bpf, offload: Replace bitwise AND by logical AND in bpf_prog_offload_info_fill (bsc#1109837).\n- CIFS: add a debug macro that prints \\\\server\\share for errors (bsc#1144333).\n- CIFS: add missing mount option to /proc/mounts (bsc#1144333).\n- CIFS: add new debugging macro cifs_server_dbg (bsc#1144333).\n- CIFS: add passthrough for smb2 setinfo (bsc#1144333).\n- CIFS: add SMB2_open() arg to return POSIX data (bsc#1144333).\n- CIFS: add smb2 POSIX info level (bsc#1144333).\n- CIFS: add SMB3 change notification support (bsc#1144333).\n- CIFS: add support for fallocate mode 0 for non-sparse files (bsc#1144333).\n- CIFS: Add support for setting owner info, dos attributes, and create time (bsc#1144333).\n- CIFS: Add tracepoints for errors on flush or fsync (bsc#1144333).\n- CIFS: Adjust indentation in smb2_open_file (bsc#1144333).\n- CIFS: allow chmod to set mode bits using special sid (bsc#1144333).\n- CIFS: Avoid doing network I/O while holding cache lock (bsc#1144333).\n- CIFS: call wake_up(server-\u003eresponse_q) inside of cifs_reconnect() (bsc#1144333).\n- CIFS: Clean up DFS referral cache (bsc#1144333).\n- CIFS: create a helper function to parse the query-directory response buffer (bsc#1144333).\n- CIFS: do d_move in rename (bsc#1144333).\n- CIFS: Do not display RDMA transport on reconnect (bsc#1144333).\n- CIFS: do not ignore the SYNC flags in getattr (bsc#1144333).\n- CIFS: do not leak -EAGAIN for stat() during reconnect (bsc#1144333).\n- CIFS: do not use \u0027pre:\u0027 for MODULE_SOFTDEP (bsc#1144333).\n- CIFS: enable change notification for SMB2.1 dialect (bsc#1144333).\n- CIFS: fail i/o on soft mounts if sessionsetup errors out (bsc#1144333).\n- CIFS: fix a comment for the timeouts when sending echos (bsc#1144333).\n- CIFS: fix a white space issue in cifs_get_inode_info() (bsc#1144333).\n- CIFS: fix dereference on ses before it is null checked (bsc#1144333).\n- CIFS: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- CIFS: fix mode bits from dir listing when mounted with modefromsid (bsc#1144333).\n- CIFS: Fix mode output in debugging statements (bsc#1144333).\n- CIFS: Fix mount options set in automount (bsc#1144333).\n- CIFS: fix NULL dereference in match_prepath (bsc#1144333).\n- CIFS: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1144333).\n- CIFS: fix potential mismatch of UNC paths (bsc#1144333).\n- CIFS: fix rename() by ensuring source handle opened with DELETE bit (bsc#1144333).\n- CIFS: Fix return value in __update_cache_entry (bsc#1144333).\n- CIFS: fix soft mounts hanging in the reconnect code (bsc#1144333).\n- CIFS: fix soft mounts hanging in the reconnect code (bsc#1144333).\n- CIFS: Fix task struct use-after-free on reconnect (bsc#1144333).\n- CIFS: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1144333).\n- CIFS: get mode bits from special sid on stat (bsc#1144333).\n- CIFS: Get rid of kstrdup_const()\u0027d paths (bsc#1144333).\n- CIFS: handle prefix paths in reconnect (bsc#1144333).\n- CIFS: Introduce helpers for finding TCP connection (bsc#1144333).\n- CIFS: log warning message (once) if out of disk space (bsc#1144333).\n- CIFS: make sure we do not overflow the max EA buffer size (bsc#1144333).\n- CIFS: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1144333).\n- CIFS: Merge is_path_valid() into get_normalized_path() (bsc#1144333).\n- CIFS: modefromsid: make room for 4 ACE (bsc#1144333).\n- CIFS: modefromsid: write mode ACE first (bsc#1144333).\n- CIFS: Optimize readdir on reparse points (bsc#1144333).\n- CIFS: plumb smb2 POSIX dir enumeration (bsc#1144333).\n- CIFS: potential unintitliazed error code in cifs_getattr() (bsc#1144333).\n- CIFS: prepare SMB2_query_directory to be used with compounding (bsc#1144333).\n- CIFS: print warning once if mounting with vers=1.0 (bsc#1144333).\n- CIFS: refactor cifs_get_inode_info() (bsc#1144333).\n- CIFS: remove redundant assignment to pointer pneg_ctxt (bsc#1144333).\n- CIFS: remove redundant assignment to variable rc (bsc#1144333).\n- CIFS: remove set but not used variables (bsc#1144333).\n- CIFS: remove set but not used variable \u0027server\u0027 (bsc#1144333).\n- CIFS: remove unused variable (bsc#1144333).\n- CIFS: remove unused variable \u0027sid_user\u0027 (bsc#1144333).\n- CIFS: rename a variable in SendReceive() (bsc#1144333).\n- CIFS: rename posix create rsp (bsc#1144333).\n- CIFS: replace various strncpy with strscpy and similar (bsc#1144333).\n- CIFS: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1144333).\n- CIFS: set correct max-buffer-size for smb2_ioctl_init() (bsc#1144333).\n- CIFS: smbd: Add messages on RDMA session destroy and reconnection (bsc#1144333).\n- CIFS: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1144333).\n- CIFS: smbd: Only queue work for error recovery on memory registration (bsc#1144333).\n- CIFS: smbd: Return -EAGAIN when transport is reconnecting (bsc#1144333).\n- CIFS: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1144333).\n- CIFS: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1144333).\n- CIFS: Use common error handling code in smb2_ioctl_query_info() (bsc#1144333).\n- CIFS: use compounding for open and first query-dir for readdir() (bsc#1144333).\n- CIFS: Use #define in cifs_dbg (bsc#1144333).\n- CIFS: Use memdup_user() rather than duplicating its implementation (bsc#1144333).\n- CIFS: use mod_delayed_work() for server-\u003ereconnect if already queued (bsc#1144333).\n- CIFS: use PTR_ERR_OR_ZERO() to simplify code (bsc#1144333).\n- cls_rsvp: fix rsvp_policy (networking-stable-20_02_05).\n- core: Do not skip generic XDP program execution for cloned SKBs (bsc#1109837).\n- cpufreq: powernv: Fix unsafe notifiers (bsc#1065729).\n- cpufreq: powernv: Fix use-after-free (bsc#1065729).\n- crypto: pcrypt - Fix user-after-free on module unload (git-fixes).\n- devlink: report 0 after hitting end in region read (bsc#1109837).\n- dmaengine: coh901318: Fix a double lock bug in dma_tc_handle() (bsc#1051510).\n- driver core: platform: fix u32 greater or equal to zero comparison (bsc#1051510).\n- driver core: platform: Prevent resouce overflow from causing infinite loops (bsc#1051510).\n- driver core: Print device when resources present in really_probe() (bsc#1051510).\n- drivers/md/raid5.c: use the new spelling of RWH_WRITE_LIFE_NOT_SET (bsc#1166003).\n- drivers/md/raid5-ppl.c: use the new spelling of RWH_WRITE_LIFE_NOT_SET (bsc#1166003).\n- drm/amd/dm/mst: Ignore payload update failures (bsc#1112178)\n- drm/amdkfd: fix a use after free race with mmu_notifer unregister (bsc#1114279)\n- drm: atmel-hlcdc: enable clock before configuring timing engine (bsc#1114279)\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1114279)\n- drm/gma500: Fixup fbdev stolen size usage evaluation (bsc#1051510).\n- drm/i915/gvt: Fix orphan vgpu dmabuf_objs\u0027 lifetime (git-fixes).\n- drm/i915/gvt: Fix unnecessary schedule timer when no vGPU exits (git-fixes).\n- drm/i915/gvt: Separate display reset from ALL_ENGINES reset (bsc#1114279)\n- drm/i915: Program MBUS with rmw during initialization (git-fixes).\n- drm/i915/selftests: Fix return in assert_mmap_offset() (bsc#1114279) \n- drm/i915/userptr: fix size calculation (bsc#1114279)\n- drm/i915/userptr: Try to acquire the page lock around (bsc#1114279)\n- drm/i915: Wean off drm_pci_alloc/drm_pci_free (bsc#1114279)\n- drm/mediatek: Add gamma property according to hardware capability (bsc#1114279)\n- drm/mediatek: disable all the planes in atomic_disable (bsc#1114279)\n- drm/mediatek: handle events when enabling/disabling crtc (bsc#1051510).\n- drm/mipi_dbi: Fix off-by-one bugs in mipi_dbi_blank() (bsc#1114279)\n- drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable (bsc#1114279)\n- drm/nouveau/disp/nv50-: prevent oops when no channel method map provided (bsc#1051510).\n- drm/nouveau/gr/gk20a,gm200-: add terminators to method lists read from fw (bsc#1051510).\n- drm/nouveau/kms/gv100-: Re-set LUT after clearing for modesets (git-fixes).\n- drm: rcar-du: Recognize \u0027renesas,vsps\u0027 in addition to \u0027vsps\u0027 (bsc#1114279)\n- drm: remove the newline for CRC source name (bsc#1051510).\n- EDAC/mc: Fix use-after-free and memleaks during device removal (bsc#1114279).\n- Enabled the following two patches in series.conf, and refresh the KABI patch due to previous md commit (bsc#1119680)\n- ethtool: Factored out similar ethtool link settings for virtual devices to core (bsc#1136157 ltc#177197).\n- fcntl: fix typo in RWH_WRITE_LIFE_NOT_SET r/w hint name (bsc#1166003).\n- firmware: imx: misc: Align imx sc msg structs to 4 (git-fixes).\n- firmware: imx: scu: Ensure sequential TX (git-fixes).\n- firmware: imx: scu-pd: Align imx sc msg structs to 4 (git-fixes).\n- Fixed memory leak in large read decrypt offload (bsc#1144333).\n- Fixed some regressions (bsc#1165527 ltc#184149).\n- fs/cifs/cifssmb.c: use true,false for bool variable (bsc#1144333).\n- fs: cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1144333).\n- fs: cifs: Initialize filesystem timestamp ranges (bsc#1144333).\n- fs: cifs: mute -Wunused-const-variable message (bsc#1144333).\n- fs/cifs/sess.c: Remove set but not used variable \u0027capabilities\u0027 (bsc#1144333).\n- fs/cifs/smb2ops.c: use true,false for bool variable (bsc#1144333).\n- fs/cifs/smb2pdu.c: Make SMB2_notify_init static (bsc#1144333).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- gtp: make sure only SOCK_DGRAM UDP sockets are accepted (networking-stable-20_01_27).\n- gtp: use __GFP_NOWARN to avoid memalloc warning (networking-stable-20_02_05).\n- HID: core: fix off-by-one memset in hid_report_raw_event() (bsc#1051510).\n- HID: hiddev: Fix race in in hiddev_disconnect() (git-fixes).\n- hv_netvsc: Fix memory leak when removing rndis device (networking-stable-20_01_20).\n- hwmon: (adt7462) Fix an error return in ADT7462_REG_VOLT() (bsc#1051510).\n- IB/hfi1: Close window for pq and request coliding (bsc#1060463 ).\n- ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).\n- ibmvnic: Do not process device remove during device reset (bsc#1065729).\n- ibmvnic: Warn unknown speed message only when carrier is present (bsc#1065729).\n- Input: edt-ft5x06 - work around first register access error (bsc#1051510).\n- Input: synaptics - enable SMBus on ThinkPad L470 (bsc#1051510).\n- Input: synaptics - remove the LEN0049 dmi id from topbuttonpad list (bsc#1051510).\n- Input: synaptics - switch T470s to RMI4 by default (bsc#1051510).\n- iommu/amd: Check feature support bit before accessing MSI capability registers (bsc#1166101).\n- iommu/amd: Only support x2APIC with IVHD type 11h/40h (bsc#1166102).\n- iommu/amd: Remap the IOMMU device table with the memory encryption mask for kdump (bsc#1141895).\n- iommu/dma: Fix MSI reservation allocation (bsc#1166730).\n- iommu/vt-d: dmar: replace WARN_TAINT with pr_warn + add_taint (bsc#1166731).\n- iommu/vt-d: Fix a bug in intel_iommu_iova_to_phys() for huge page (bsc#1166732).\n- iommu/vt-d: Fix compile warning from intel-svm.h (bsc#1166103).\n- iommu/vt-d: Fix the wrong printing in RHSA parsing (bsc#1166733).\n- iommu/vt-d: Ignore devices with out-of-spec domain number (bsc#1166734).\n- iommu/vt-d: quirk_ioat_snb_local_iommu: replace WARN_TAINT with pr_warn + add_taint (bsc#1166735).\n- ipv4: ensure rcu_read_lock() in cipso_v4_error() (git-fixes).\n- ipv6: restrict IPV6_ADDRFORM operation (bsc#1109837).\n- iwlegacy: Fix -Wcast-function-type (bsc#1051510).\n- iwlwifi: mvm: Do not require PHY_SKU NVM section for 3168 devices (bsc#1166632).\n- iwlwifi: mvm: Fix thermal zone registration (bsc#1051510).\n- kdump, proc/vmcore: Enable kdumping encrypted memory with SME enabled (bsc#1141895).\n- kernel/module.c: Only return -EEXIST for modules that have finished loading (bsc#1165488).\n- kernel/module.c: wakeup processes in module_wq on module unload (bsc#1165488).\n- kexec: Allocate decrypted control pages for kdump if SME is enabled (bsc#1141895).\n- KVM: arm64: Store vcpu on the stack during __guest_enter() (bsc#1133021).\n- KVM: s390: do not clobber registers during guest reset/store status (bsc#1133021).\n- KVM: s390: ENOTSUPP -\u003e EOPNOTSUPP fixups (bsc#1133021).\n- KVM: VMX: check descriptor table exits on instruction emulation (bsc#1166104).\n- l2tp: Allow duplicate session creation with UDP (networking-stable-20_02_05).\n- libnvdimm/pfn_dev: Do not clear device memmap area during generic namespace probe (bsc#1165929 bsc#1165950).\n- libnvdimm/pfn: fix fsdax-mode namespace info-block zero-fields (bsc#1165929).\n- libnvdimm: remove redundant __func__ in dev_dbg (bsc#1165929).\n- lib/raid6: add missing include for raid6test (bsc#1166003).\n- lib/raid6: add option to skip algo benchmarking (bsc#1166003).\n- lib/raid6: avoid __attribute_const__ redefinition (bsc#1166003).\n- md: add __acquires/__releases annotations to handle_active_stripes (bsc#1166003).\n- md: add __acquires/__releases annotations to (un)lock_two_stripes (bsc#1166003).\n- md: add a missing endianness conversion in check_sb_changes (bsc#1166003).\n- md: add bitmap_abort label in md_run (bsc#1166003).\n- md: add feature flag MD_FEATURE_RAID0_LAYOUT (bsc#1166003).\n- md: allow last device to be forcibly removed from RAID1/RAID10 (bsc#1166003).\n- md: avoid invalid memory access for array sb-\u003edev_roles (bsc#1166003).\n- md/bitmap: avoid race window between md_bitmap_resize and bitmap_file_clear_bit (bsc#1166003).\n- md-bitmap: create and destroy wb_info_pool with the change of backlog (bsc#1166003).\n- md-bitmap: create and destroy wb_info_pool with the change of bitmap (bsc#1166003).\n- md-bitmap: small cleanups (bsc#1166003).\n- md/bitmap: use mddev_suspend/resume instead of -\u003equiesce() (bsc#1166003).\n- md-cluster/bitmap: do not call md_bitmap_sync_with_cluster during reshaping stage (bsc#1166003).\n- md-cluster: introduce resync_info_get interface for sanity check (bsc#1166003).\n- md-cluster/raid10: call update_size in md_reap_sync_thread (bsc#1166003).\n- md-cluster/raid10: do not call remove_and_add_spares during reshaping stage (bsc#1166003).\n- md-cluster/raid10: resize all the bitmaps before start reshape (bsc#1166003).\n- md-cluster/raid10: support add disk under grow mode (bsc#1166003).\n- md-cluster: remove suspend_info (bsc#1166003).\n- md-cluster: send BITMAP_NEEDS_SYNC message if reshaping is interrupted (bsc#1166003).\n- md: convert to kvmalloc (bsc#1166003).\n- md: do not call spare_active in md_reap_sync_thread if all member devices can\u0027t work (bsc#1166003).\n- md: do not set In_sync if array is frozen (bsc#1166003).\n- md: fix a typo s/creat/create (bsc#1166003).\n- md: fix for divide error in status_resync (bsc#1166003).\n- md: fix spelling typo and add necessary space (bsc#1166003).\n- md: introduce mddev_create/destroy_wb_pool for the change of member device (bsc#1166003).\n- md-linear: use struct_size() in kzalloc() (bsc#1166003).\n- md: Make bio_alloc_mddev use bio_alloc_bioset (bsc#1166003).\n- md: make sure desc_nr less than MD_SB_DISKS (bsc#1166003).\n- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1166003).\n- md: no longer compare spare disk superblock events in super_load (bsc#1166003).\n- md/raid0: Fix an error message in raid0_make_request() (bsc#1166003).\n- md raid0/linear: Mark array as \u0027broken\u0027 and fail BIOs if a member is gone (bsc#1166003).\n- md/raid10: end bio when the device faulty (bsc#1166003).\n- md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1166003).\n- md/raid10: prevent access of uninitialized resync_pages offset (bsc#1166003).\n- md/raid10: read balance chooses idlest disk for SSD (bsc#1166003).\n- md: raid10: Use struct_size() in kmalloc() (bsc#1166003).\n- md/raid1: avoid soft lockup under high load (bsc#1166003).\n- md: raid1: check rdev before reference in raid1_sync_request func (bsc#1166003).\n- md/raid1: end bio when the device faulty (bsc#1166003).\n- md/raid1: fail run raid1 array when active disk less than one (bsc#1166003).\n- md/raid1: Fix a warning message in remove_wb() (bsc#1166003).\n- md/raid1: fix potential data inconsistency issue with write behind device (bsc#1166003).\n- md/raid1: get rid of extra blank line and space (bsc#1166003).\n- md/raid5: use bio_end_sector to calculate last_sector (bsc#1166003).\n- md/raid6: fix algorithm choice under larger PAGE_SIZE (bsc#1166003).\n- md: remove set but not used variable \u0027bi_rdev\u0027 (bsc#1166003).\n- md: rename wb stuffs (bsc#1166003).\n- md: return -ENODEV if rdev has no mddev assigned (bsc#1166003).\n- md: use correct type in super_1_load (bsc#1166003).\n- md: use correct type in super_1_sync (bsc#1166003).\n- md: use correct types in md_bitmap_print_sb (bsc#1166003).\n- media: uvcvideo: Refactor teardown of uvc on USB disconnect (bsc#1164507).\n- mlxsw: spectrum_qdisc: Include MC TCs in Qdisc counters (bsc#1112374).\n- mlxsw: spectrum: Wipe xstats.backlog of down ports (bsc#1112374).\n- net: cxgb3_main: Add CAP_NET_ADMIN check to CHELSIO_GET_MEM (networking-stable-20_01_27).\n- net: dsa: mv88e6xxx: Preserve priority when setting CPU port (networking-stable-20_01_11).\n- net: dsa: tag_qca: fix doubled Tx statistics (networking-stable-20_01_20).\n- net/ethtool: Introduce link_ksettings API for virtual network devices (bsc#1136157 ltc#177197).\n- net: Fix Tx hash bound checking (bsc#1109837).\n- net: hns3: fix a copying IPv6 address error in hclge_fd_get_flow_tuples() (bsc#1104353).\n- net: hns: fix soft lockup when there is not enough memory (networking-stable-20_01_20).\n- net: hsr: fix possible NULL deref in hsr_handle_frame() (networking-stable-20_02_05).\n- net: ip6_gre: fix moving ip6gre between namespaces (networking-stable-20_01_27).\n- net, ip6_tunnel: fix namespaces move (networking-stable-20_01_27).\n- net, ip_tunnel: fix namespaces move (networking-stable-20_01_27).\n- net: macb: Limit maximum GEM TX length in TSO (networking-stable-20_02_09).\n- net: macb: Remove unnecessary alignment check for TSO (networking-stable-20_02_09).\n- net/mlx5: Fix lowest FDB pool size (bsc#1103990).\n- net/mlx5: IPsec, Fix esp modify function attribute (bsc#1103990 ).\n- net/mlx5: IPsec, fix memory leak at mlx5_fpga_ipsec_delete_sa_ctx (bsc#1103990).\n- net/mlx5: Update the list of the PCI supported devices (bsc#1127611).\n- net/mlxfw: Verify FSM error code translation does not exceed array size (bsc#1051858).\n- net: mvneta: move rx_dropped and rx_errors in per-cpu stats (networking-stable-20_02_09).\n- net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link() (networking-stable-20_01_27).\n- net_sched: ematch: reject invalid TCF_EM_SIMPLE (networking-stable-20_01_30).\n- net_sched: fix an OOB access in cls_tcindex (networking-stable-20_02_05).\n- net_sched: fix a resource leak in tcindex_set_parms() (networking-stable-20_02_09).\n- net_sched: fix datalen for ematch (networking-stable-20_01_27).\n- net: sch_prio: When ungrafting, replace with FIFO (networking-stable-20_01_11).\n- net/smc: add fallback check to connect() (git-fixes).\n- net/smc: fix cleanup for linkgroup setup failures (git-fixes).\n- net/smc: no peer ID in CLC decline for SMCD (git-fixes).\n- net/smc: transfer fasync_list in case of fallback (git-fixes).\n- net: stmmac: dwmac-sunxi: Allow all RGMII modes (networking-stable-20_01_11).\n- net-sysfs: Fix reference count leak (networking-stable-20_01_27).\n- net: systemport: Avoid RBUF stuck in Wake-on-LAN mode (networking-stable-20_02_09).\n- net/tls: fix async operation (bsc#1109837).\n- net/tls: free the record on encryption error (bsc#1109837).\n- net/tls: take into account that bpf_exec_tx_verdict() may free the record (bsc#1109837).\n- net: usb: lan78xx: Add .ndo_features_check (networking-stable-20_01_27).\n- net: usb: lan78xx: fix possible skb leak (networking-stable-20_01_11).\n- net/wan/fsl_ucc_hdlc: fix out of bounds write on array utdm_info (networking-stable-20_01_20).\n- NFC: pn544: Fix a typo in a debug message (bsc#1051510).\n- NFC: port100: Convert cpu_to_le16(le16_to_cpu(E1) + E2) to use le16_add_cpu() (bsc#1051510).\n- nvme: Fix parsing of ANA log page (bsc#1166658).\n- nvme: resync include/linux/nvme.h with nvmecli (bsc#1156510).\n- nvme: Translate more status codes to blk_status_t (bsc#1156510).\n- orinoco: avoid assertion in case of NULL pointer (bsc#1051510).\n- padata: always acquire cpu_hotplug_lock before pinst-\u003elock (git-fixes).\n- PCI/AER: Clear device status bits during ERR_COR handling (bsc#1161561).\n- PCI/AER: Clear device status bits during ERR_FATAL and ERR_NONFATAL (bsc#1161561).\n- PCI/AER: Clear only ERR_FATAL status bits during fatal recovery (bsc#1161561).\n- PCI/AER: Clear only ERR_NONFATAL bits during non-fatal recovery (bsc#1161561).\n- PCI/AER: Do not clear AER bits if error handling is Firmware-First (bsc#1161561).\n- PCI/AER: Do not read upstream ports below fatal errors (bsc#1161561).\n- PCI/AER: Factor out ERR_NONFATAL status bit clearing (bsc#1161561).\n- PCI/AER: Take reference on error devices (bsc#1161561).\n- PCI/ERR: Run error recovery callbacks for all affected devices (bsc#1161561).\n- PCI/ERR: Use slot reset if available (bsc#1161561).\n- pinctrl: baytrail: Do not clear IRQ flags on direct-irq enabled pins (bsc#1051510).\n- pinctrl: imx: scu: Align imx sc msg structs to 4 (git-fixes).\n- pinctrl: sh-pfc: sh7264: Fix CAN function GPIOs (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Fix CAN function GPIOs (bsc#1051510).\n- pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM (networking-stable-20_01_11).\n- platform/mellanox: fix potential deadlock in the tmfifo driver (bsc#1136333 jsc#SLE-4994).\n- powerpc: fix hardware PMU exception bug on PowerVM compatibility mode systems (bsc#1056686).\n- powerpc/pseries: Avoid NULL pointer dereference when drmem is unavailable (bsc#1160659).\n- powerpc/pseries: fix of_read_drc_info_cell() to point at next record (bsc#1165980 ltc#183834).\n- powerpc/pseries: group lmb operation and memblock\u0027s (bsc#1165404 ltc#183498).\n- powerpc/pseries/memory-hotplug: Only update DT once per memory DLPAR request (bsc#1165404 ltc#183498).\n- powerpc/pseries: update device tree before ejecting hotplug uevents (bsc#1165404 ltc#183498).\n- powerpc/smp: Use nid as fallback for package_id (bsc#1165813 ltc#184091).\n- ptr_ring: add include of linux/mm.h (bsc#1109837).\n- qmi_wwan: re-add DW5821e pre-production variant (bsc#1051510).\n- raid10: refactor common wait code from regular read/write request (bsc#1166003).\n- raid1: factor out a common routine to handle the completion of sync write (bsc#1166003).\n- raid1: simplify raid1_error function (bsc#1166003).\n- raid1: use an int as the return value of raise_barrier() (bsc#1166003).\n- raid5: block failing device if raid will be failed (bsc#1166003).\n- raid5: do not increment read_errors on EILSEQ return (bsc#1166003).\n- raid5: do not set STRIPE_HANDLE to stripe which is in batch list (bsc#1166003).\n- raid5 improve too many read errors msg by adding limits (bsc#1166003).\n- raid5: need to set STRIPE_HANDLE for batch head (bsc#1166003).\n- raid5: remove STRIPE_OPS_REQ_PENDING (bsc#1166003).\n- raid5: remove worker_cnt_per_group argument from alloc_thread_groups (bsc#1166003). \n- raid5: set write hint for PPL (bsc#1166003).\n- raid5: use bio_end_sector in r5_next_bio (bsc#1166003).\n- raid6/test: fix a compilation error (bsc#1166003).\n- raid6/test: fix a compilation warning (bsc#1166003).\n- RDMA/cma: Fix unbalanced cm_id reference count during address resolve (bsc#1103992).\n- RDMA/hfi1: Fix memory leak in _dev_comp_vect_mappings_create (bsc#1114685).\n- RDMA/uverbs: Verify MR access flags (bsc#1103992).\n- remoteproc: Initialize rproc_class before use (bsc#1051510).\n- Revert \u0027HID: add NOGET quirk for Eaton Ellipse MAX UPS\u0027 (git-fixes).\n- rtlwifi: rtl_pci: Fix -Wcast-function-type (bsc#1051510).\n- rxrpc: Fix insufficient receive notification generation (networking-stable-20_02_05).\n- s390/pci: Fix unexpected write combine on resource (git-fixes).\n- s390/uv: Fix handling of length extensions (git-fixes).\n- scsi: fnic: do not queue commands during fwreset (bsc#1146539).\n- scsi: ibmvfc: Add failed PRLI to cmd_status lookup array (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Byte swap status and error codes when logging (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Clean up transport events (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: constify dev_pm_ops structures (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Do not call fc_block_scsi_eh() on host reset (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: ibmvscsi: ibmvscsi_tgt: constify vio_device_id (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Mark expected switch fall-throughs (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Remove \u0027failed\u0027 from logged errors (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Remove unneeded semicolons (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: change strncpy+truncation to strlcpy (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: constify dev_pm_ops structures (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: Do not use rc uninitialized in ibmvscsi_do_work (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: fix tripping of blk_mq_run_hw_queue WARN_ON (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: Improve strings handling (bsc#1161951 ltc#183551). \n- scsi: ibmvscsi: redo driver work thread to use enum action states (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: Wire up host_reset() in the driver\u0027s scsi_host_template (bsc#1161951 ltc#183551).\n- scsi: qla2xxx: Add 16.0GT for PCI String (bsc#1157424).\n- scsi: qla2xxx: Add beacon LED config sysfs interface (bsc#1157424).\n- scsi: qla2xxx: Add changes in preparation for vendor extended FDMI/RDP (bsc#1157424).\n- scsi: qla2xxx: Add deferred queue for processing ABTS and RDP (bsc#1157424).\n- scsi: qla2xxx: Add endianizer macro calls to fc host stats (bsc#1157424).\n- scsi: qla2xxx: Add fixes for mailbox command (bsc#1157424).\n- scsi: qla2xxx: add more FW debug information (bsc#1157424).\n- scsi: qla2xxx: Add ql2xrdpenable module parameter for RDP (bsc#1157424).\n- scsi: qla2xxx: Add sysfs node for D-Port Diagnostics AEN data (bsc#1157424).\n- scsi: qla2xxx: Add vendor extended FDMI commands (bsc#1157424).\n- scsi: qla2xxx: Add vendor extended RDP additions and amendments (bsc#1157424).\n- scsi: qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options (bsc#1157424).\n- scsi: qla2xxx: Check locking assumptions at runtime in qla2x00_abort_srb() (bsc#1157424).\n- scsi: qla2xxx: Cleanup ELS/PUREX iocb fields (bsc#1157424).\n- scsi: qla2xxx: Convert MAKE_HANDLE() from a define into an inline function (bsc#1157424).\n- scsi: qla2xxx: Correction to selection of loopback/echo test (bsc#1157424).\n- scsi: qla2xxx: Display message for FCE enabled (bsc#1157424).\n- scsi: qla2xxx: Fix control flags for login/logout IOCB (bsc#1157424).\n- scsi: qla2xxx: Fix FCP-SCSI FC4 flag passing error (bsc#1157424).\n- scsi: qla2xxx: fix FW resource count values (bsc#1157424).\n- scsi: qla2xxx: Fix NPIV instantiation after FW dump (bsc#1157424).\n- scsi: qla2xxx: Fix qla2x00_echo_test() based on ISP type (bsc#1157424).\n- scsi: qla2xxx: Fix RDP respond data format (bsc#1157424).\n- scsi: qla2xxx: Fix RDP response size (bsc#1157424).\n- scsi: qla2xxx: Fix sparse warning reported by kbuild bot (bsc#1157424).\n- scsi: qla2xxx: Fix sparse warnings triggered by the PCI state checking code (bsc#1157424).\n- scsi: qla2xxx: Force semaphore on flash validation failure (bsc#1157424).\n- scsi: qla2xxx: Handle cases for limiting RDP response payload length (bsc#1157424).\n- scsi: qla2xxx: Handle NVME status iocb correctly (bsc#1157424).\n- scsi: qla2xxx: Improved secure flash support messages (bsc#1157424).\n- scsi: qla2xxx: Move free of fcport out of interrupt context (bsc#1157424).\n- scsi: qla2xxx: Print portname for logging in qla24xx_logio_entry() (bsc#1157424).\n- scsi: qla2xxx: Remove restriction of FC T10-PI and FC-NVMe (bsc#1157424).\n- scsi: qla2xxx: Return appropriate failure through BSG Interface (bsc#1157424).\n- scsi: qla2xxx: Save rscn_gen for new fcport (bsc#1157424).\n- scsi: qla2xxx: Serialize fc_port alloc in N2N (bsc#1157424).\n- scsi: qla2xxx: Set Nport ID for N2N (bsc#1157424).\n- scsi: qla2xxx: Show correct port speed capabilities for RDP command (bsc#1157424).\n- scsi: qla2xxx: Simplify the code for aborting SCSI commands (bsc#1157424).\n- scsi: qla2xxx: Suppress endianness complaints in qla2x00_configure_local_loop() (bsc#1157424).\n- scsi: qla2xxx: Update BPM enablement semantics (bsc#1157424).\n- scsi: qla2xxx: Update driver version to 10.01.00.24-k (bsc#1157424).\n- scsi: qla2xxx: Update driver version to 10.01.00.25-k (bsc#1157424).\n- scsi: qla2xxx: Use a dedicated interrupt handler for \u0027handshake-required\u0027 ISPs (bsc#1157424).\n- scsi: qla2xxx: Use correct ISP28xx active FW region (bsc#1157424).\n- scsi: qla2xxx: Use endian macros to assign static fields in fwdump header (bsc#1157424).\n- scsi: qla2xxx: Use FC generic update firmware options routine for ISP27xx (bsc#1157424).\n- scsi: qla2xxx: Use QLA_FW_STOPPED macro to propagate flag (bsc#1157424).\n- scsi: tcm_qla2xxx: Make qlt_alloc_qfull_cmd() set cmd-\u003ese_cmd.map_tag (bsc#1157424).\n- sctp: free cmd-\u003eobj.chunk for the unprocessed SCTP_CMD_REPLY (networking-stable-20_01_11).\n- smb3: add debug messages for closing unmatched open (bsc#1144333).\n- smb3: Add defines for new information level, FileIdInformation (bsc#1144333).\n- smb3: add dynamic tracepoints for flush and close (bsc#1144333).\n- smb3: add missing flag definitions (bsc#1144333).\n- smb3: Add missing reparse tags (bsc#1144333).\n- smb3: add missing worker function for SMB3 change notify (bsc#1144333).\n- smb3: add mount option to allow forced caching of read only share (bsc#1144333).\n- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1144333).\n- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1144333).\n- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1144333).\n- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1144333).\n- smb3: allow disabling requesting leases (bsc#1144333).\n- smb3: allow parallelizing decryption of reads (bsc#1144333).\n- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1144333).\n- smb3: Backup intent flag missing from some more ops (bsc#1144333).\n- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1144333).\n- smb3: display max smb3 requests in flight at any one time (bsc#1144333).\n- smb3: dump in_send and num_waiters stats counters by default (bsc#1144333).\n- smb3: enable offload of decryption of large reads via mount option (bsc#1144333).\n- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1144333).\n- smb3: fix mode passed in on create for modetosid mount option (bsc#1144333).\n- smb3: fix performance regression with setting mtime (bsc#1144333).\n- smb3: fix potential null dereference in decrypt offload (bsc#1144333).\n- smb3: fix problem with null cifs super block with previous patch (bsc#1144333).\n- smb3: Fix regression in time handling (bsc#1144333).\n- smb3: improve check for when we send the security descriptor context on create (bsc#1144333).\n- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1144333).\n- smb3: missing ACL related flags (bsc#1144333).\n- smb3: only offload decryption of read responses if multiple requests (bsc#1144333).\n- smb3: pass mode bits into create calls (bsc#1144333).\n- smb3: print warning once if posix context returned on open  (bsc#1144333).\n- smb3: query attributes on file close (bsc#1144333).\n- smb3: remove noisy debug message and minor cleanup (bsc#1144333).\n- smb3: remove unused flag passed into close functions (bsc#1144333).\n- staging: rtl8188eu: Fix potential overuse of kernel memory (bsc#1051510).\n- staging: rtl8188eu: Fix potential security hole (bsc#1051510).\n- staging: rtl8723bs: Fix potential overuse of kernel memory (bsc#1051510).\n- staging: rtl8723bs: Fix potential security hole (bsc#1051510).\n- SUNRPC: Fix svcauth_gss_proxy_init() (bsc#1103992).\n- tcp_bbr: improve arithmetic division in bbr_update_bw() (networking-stable-20_01_27).\n- tcp: clear tp-\u003edata_segs{in|out} in tcp_disconnect() (networking-stable-20_02_05).\n- tcp: clear tp-\u003edelivered in tcp_disconnect() (networking-stable-20_02_05).\n- tcp: clear tp-\u003esegs_{in|out} in tcp_disconnect() (networking-stable-20_02_05).\n- tcp: clear tp-\u003etotal_retrans in tcp_disconnect() (networking-stable-20_02_05).\n- tcp: fix marked lost packets not being retransmitted (networking-stable-20_01_20).\n- tcp: fix \u0027old stuff\u0027 D-SACK causing SACK to be treated as D-SACK (networking-stable-20_01_11).\n- thunderbolt: Prevent crash if non-active NVMem file is read (git-fixes).\n- tick: broadcast-hrtimer: Fix a race in bc_set_next (bsc#1044231).\n- tools lib traceevent: Do not free tep-\u003ecmdlines in add_new_comm() on failure (git-fixes).\n- tools: Update include/uapi/linux/fcntl.h copy from the kernel (bsc#1166003).\n- ttyprintk: fix a potential deadlock in interrupt context issue (git-fixes).\n- tun: add mutex_unlock() call and napi.skb clearing in tun_get_user() (bsc#1109837).\n- Updated block layer, timers and md code for SLE15-SP1 kernel (bsc#1111974).\n- Updated \u0027drm/i915: Wean off drm_pci_alloc/drm_pci_free\u0027 (bsc#1114279) \n- USB: core: add endpoint-blacklist quirk (git-fixes).\n- USBip: Fix uninitialized symbol \u0027nents\u0027 in stub_recv_cmd_submit() (git-fixes).\n- USB: quirks: blacklist duplicate ep on Sound Devices USBPre2 (git-fixes).\n- uvcvideo: Refactor teardown of uvc on USB disconnect (https://patchwork.kernel.org/patch/9683663/) (bsc#1164507)\n- vgacon: Fix a UAF in vgacon_invert_region (bsc#1114279)\n- virtio-blk: fix hw_queue stopped on arbitrary error (git-fixes).\n- vlan: fix memory leak in vlan_dev_set_egress_priority (networking-stable-20_01_11).\n- vlan: vlan_changelink() should propagate errors (networking-stable-20_01_11).\n- vxlan: fix tos value before xmit (networking-stable-20_01_11).\n- x86/cpu/amd: Enable the fixed Instructions Retired counter IRPERF (bsc#1114279).\n- x86/ioremap: Add an ioremap_encrypted() helper (bsc#1141895).\n- x86/kdump: Export the SME mask to vmcoreinfo (bsc#1141895).\n- x86/mce/amd: Fix kobject lifetime (bsc#1114279).\n- x86/mce/amd: Publish the bank pointer only after setup has succeeded (bsc#1114279).\n- x86/mm: Split vmalloc_sync_all() (bsc#1165741).\n- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).\n- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).\n- xhci: fix runtime pm enabling for quirky Intel hosts (bsc#1051510).\n- xhci: Force Maximum Packet size for Full-speed bulk devices to valid range (bsc#1051510).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-836,SUSE-SLE-Module-Basesystem-15-SP1-2020-836,SUSE-SLE-Module-Development-Tools-15-SP1-2020-836,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-836,SUSE-SLE-Module-Legacy-15-SP1-2020-836,SUSE-SLE-Module-Live-Patching-15-SP1-2020-836,SUSE-SLE-Product-HA-15-SP1-2020-836,SUSE-SLE-Product-WE-15-SP1-2020-836",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0836-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:0836-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200836-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:0836-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1044231",
        "url": "https://bugzilla.suse.com/1044231"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051858",
        "url": "https://bugzilla.suse.com/1051858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1056686",
        "url": "https://bugzilla.suse.com/1056686"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1060463",
        "url": "https://bugzilla.suse.com/1060463"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103990",
        "url": "https://bugzilla.suse.com/1103990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103992",
        "url": "https://bugzilla.suse.com/1103992"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104353",
        "url": "https://bugzilla.suse.com/1104353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104745",
        "url": "https://bugzilla.suse.com/1104745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1109837",
        "url": "https://bugzilla.suse.com/1109837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111666",
        "url": "https://bugzilla.suse.com/1111666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111974",
        "url": "https://bugzilla.suse.com/1111974"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112374",
        "url": "https://bugzilla.suse.com/1112374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113956",
        "url": "https://bugzilla.suse.com/1113956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114685",
        "url": "https://bugzilla.suse.com/1114685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1119680",
        "url": "https://bugzilla.suse.com/1119680"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127611",
        "url": "https://bugzilla.suse.com/1127611"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1134090",
        "url": "https://bugzilla.suse.com/1134090"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1136157",
        "url": "https://bugzilla.suse.com/1136157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1141895",
        "url": "https://bugzilla.suse.com/1141895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144333",
        "url": "https://bugzilla.suse.com/1144333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146539",
        "url": "https://bugzilla.suse.com/1146539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156510",
        "url": "https://bugzilla.suse.com/1156510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157424",
        "url": "https://bugzilla.suse.com/1157424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158187",
        "url": "https://bugzilla.suse.com/1158187"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159285",
        "url": "https://bugzilla.suse.com/1159285"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160659",
        "url": "https://bugzilla.suse.com/1160659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161561",
        "url": "https://bugzilla.suse.com/1161561"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161951",
        "url": "https://bugzilla.suse.com/1161951"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162929",
        "url": "https://bugzilla.suse.com/1162929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162931",
        "url": "https://bugzilla.suse.com/1162931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164078",
        "url": "https://bugzilla.suse.com/1164078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164507",
        "url": "https://bugzilla.suse.com/1164507"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165111",
        "url": "https://bugzilla.suse.com/1165111"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165404",
        "url": "https://bugzilla.suse.com/1165404"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165488",
        "url": "https://bugzilla.suse.com/1165488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165527",
        "url": "https://bugzilla.suse.com/1165527"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165741",
        "url": "https://bugzilla.suse.com/1165741"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165813",
        "url": "https://bugzilla.suse.com/1165813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165873",
        "url": "https://bugzilla.suse.com/1165873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165929",
        "url": "https://bugzilla.suse.com/1165929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165950",
        "url": "https://bugzilla.suse.com/1165950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165980",
        "url": "https://bugzilla.suse.com/1165980"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165984",
        "url": "https://bugzilla.suse.com/1165984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165985",
        "url": "https://bugzilla.suse.com/1165985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166003",
        "url": "https://bugzilla.suse.com/1166003"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166101",
        "url": "https://bugzilla.suse.com/1166101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166102",
        "url": "https://bugzilla.suse.com/1166102"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166103",
        "url": "https://bugzilla.suse.com/1166103"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166104",
        "url": "https://bugzilla.suse.com/1166104"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166632",
        "url": "https://bugzilla.suse.com/1166632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166658",
        "url": "https://bugzilla.suse.com/1166658"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166730",
        "url": "https://bugzilla.suse.com/1166730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166731",
        "url": "https://bugzilla.suse.com/1166731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166732",
        "url": "https://bugzilla.suse.com/1166732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166733",
        "url": "https://bugzilla.suse.com/1166733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166734",
        "url": "https://bugzilla.suse.com/1166734"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166735",
        "url": "https://bugzilla.suse.com/1166735"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19768 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8647 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8649 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8649/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-9383 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-9383/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-03-31T16:39:32Z",
      "generator": {
        "date": "2020-03-31T16:39:32Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:0836-1",
      "initial_release_date": "2020-03-31T16:39:32Z",
      "revision_history": [
        {
          "date": "2020-03-31T16:39:32Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.37.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.37.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-default-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-default-livepatch-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.37.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.37.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-197.37.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-197.37.1.noarch",
                  "product_id": "kernel-devel-4.12.14-197.37.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-197.37.1.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-197.37.1.noarch",
                  "product_id": "kernel-docs-4.12.14-197.37.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-197.37.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-197.37.1.noarch",
                  "product_id": "kernel-docs-html-4.12.14-197.37.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-197.37.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-197.37.1.noarch",
                  "product_id": "kernel-macros-4.12.14-197.37.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-197.37.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-197.37.1.noarch",
                  "product_id": "kernel-source-4.12.14-197.37.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-197.37.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-197.37.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-197.37.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-debug-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-debug-livepatch-devel-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-debug-livepatch-devel-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-default-livepatch-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.37.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.37.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.37.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.37.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-livepatch-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-syms-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.37.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.37.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.37.1.s390x",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.37.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.37.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.37.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-debug-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-debug-livepatch-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-debug-livepatch-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-default-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-default-livepatch-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.37.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.37.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
                  "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
                  "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:15:sp1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-197.37.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-197.37.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-197.37.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-197.37.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-197.37.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-197.37.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-197.37.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-197.37.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-default-extra-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-19768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19768",
          "url": "https://www.suse.com/security/cve/CVE-2019-19768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159285 for CVE-2019-19768",
          "url": "https://bugzilla.suse.com/1159285"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-31T16:39:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19768"
    },
    {
      "cve": "CVE-2020-8647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8647",
          "url": "https://www.suse.com/security/cve/CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162929 for CVE-2020-8647",
          "url": "https://bugzilla.suse.com/1162929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164078 for CVE-2020-8647",
          "url": "https://bugzilla.suse.com/1164078"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-31T16:39:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8647"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-31T16:39:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8649",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8649"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8649",
          "url": "https://www.suse.com/security/cve/CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162929 for CVE-2020-8649",
          "url": "https://bugzilla.suse.com/1162929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162931 for CVE-2020-8649",
          "url": "https://bugzilla.suse.com/1162931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-31T16:39:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8649"
    },
    {
      "cve": "CVE-2020-9383",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-9383"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-9383",
          "url": "https://www.suse.com/security/cve/CVE-2020-9383"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165111 for CVE-2020-9383",
          "url": "https://bugzilla.suse.com/1165111"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-31T16:39:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-9383"
    }
  ]
}
  suse-su-2020:0688-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15-SP1 kernel-RT was updated to 4.12.14 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-8992: Fixed an issue in ext4_protect_reserved_inode in fs/ext4/block_validity.c that allowed attackers to cause a soft lockup via a crafted journal size (bsc#1164069).\n- CVE-2020-8648: Fixed a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).\n- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).\n\nThe following non-security bugs were fixed:\n\n- ACPI: PM: Avoid attaching ACPI PM domain to certain devices (bsc#1051510).\n- ACPI / video: Add force_none quirk for Dell OptiPlex 9020M (bsc#1051510).\n- ACPI: video: Do not export a non working backlight interface on MSI MS-7721 boards (bsc#1051510).\n- ACPI: watchdog: Allow disabling WDAT at boot (bsc#1162557).\n- ACPI / watchdog: Fix init failure with overlapping register regions (bsc#1162557).\n- ACPI / watchdog: Set default timeout in probe (bsc#1162557).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: hda: Add JasperLake PCI ID and codec vid (bsc#1111666).\n- ALSA: hda: Clear RIRB status before reading WP (bsc#1111666).\n- ALSA: hda: hdmi - add Tigerlake support (bsc#1111666).\n- ALSA: hda/hdmi - Clean up Intel platform-specific fixup checks (bsc#1111666).\n- ALSA: hda: hdmi - fix pin setup on Tigerlake (bsc#1111666).\n- ALSA: hda/realtek - Fixed one of HP ALC671 platform Headset Mic supported (bsc#1111666).\n- ALSA: hda/realtek - Fix silent output on MSI-GL73 (git-fixes).\n- ALSA: hda: Reset stream if DMA RUN bit not cleared (bsc#1111666).\n- ALSA: hda: Use scnprintf() for printing texts for sysfs/procfs (git-fixes).\n- ALSA: seq: Avoid concurrent access to queue flags (git-fixes).\n- ALSA: seq: Fix concurrent access to queue current tick/time (git-fixes).\n- ALSA: usb-audio: Apply sample rate quirk for Audioengine D1 (git-fixes).\n- ALSA: usb-audio: Fix endianess in descriptor validation (bsc#1111666).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ASoC: sun8i-codec: Fix setting DAI data format (git-fixes).\n- ata: ahci: Add shutdown to freeze hardware resources of ahci (bsc#1164388).\n- bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front() (bsc#1163762).\n- bcache: add code comments for state-\u003epool in __btree_sort() (bsc#1163762).\n- bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n- bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n- bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n- bcache: add more accurate error messages in read_super() (bsc#1163762).\n- bcache: add readahead cache policy options via sysfs interface (bsc#1163762).\n- bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (bsc#1163762).\n- bcache: check return value of prio_read() (bsc#1163762).\n- bcache: deleted code comments for dead code in bch_data_insert_keys() (bsc#1163762).\n- bcache: do not export symbols (bsc#1163762).\n- bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n- bcache: fix a lost wake-up problem caused by mca_cannibalize_lock (bsc#1163762).\n- bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n- bcache: fix deadlock in bcache_allocator (bsc#1163762).\n- bcache: fix incorrect data type usage in btree_flush_write() (bsc#1163762).\n- bcache: fix memory corruption in bch_cache_accounting_clear() (bsc#1163762).\n- bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n- bcache: ignore pending signals when creating gc and allocator thread (bsc#1163762, bsc#1112504).\n- bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n- bcache: reap c-\u003ebtree_cache_freeable from the tail in bch_mca_scan() (bsc#1163762).\n- bcache: reap from tail of c-\u003ebtree_cache in bch_mca_scan() (bsc#1163762).\n- bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n- bcache: remove member accessed from struct btree (bsc#1163762).\n- bcache: remove the extra cflags for request.o (bsc#1163762).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (bsc#1163762, bsc#1112504).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840).\n- blk-mq: make sure that line break can be printed (bsc#1164098).\n- Bluetooth: Fix race condition in hci_release_sock() (bsc#1051510).\n- Btrfs: do not double lock the subvol_sem for rename exchange (bsc#1162943).\n- Btrfs: fix infinite loop during fsync after rename operations (bsc#1163383).\n- Btrfs: fix race between adding and putting tree mod seq elements and nodes (bsc#1163384).\n- cdrom: respect device capabilities during opening action (boo#1164632).\n- chardev: Avoid potential use-after-free in \u0027chrdev_open()\u0027 (bsc#1163849).\n- cifs: fix mount option display for sec=krb5i (bsc#1161907).\n- clk: mmp2: Fix the order of timer mux parents (bsc#1051510).\n- clk: qcom: rcg2: Do not crash if our parent can\u0027t be found; return an error (bsc#1051510).\n- clk: sunxi-ng: add mux and pll notifiers for A64 CPU clock (bsc#1051510).\n- clk: tegra: Mark fuse clock as critical (bsc#1051510).\n- clocksource: Prevent double add_timer_on() for watchdog_timer (bsc#1051510).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- Documentation: Document arm64 kpti control (bsc#1162623).\n- drm/amd/display: Retrain dongles when SINK_COUNT becomes non-zero (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- Enable CONFIG_BLK_DEV_SR_VENDOR (boo#1164632).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- ext2: check err when partial != NULL (bsc#1163859).\n- ext4: check for directory entries too close to block end (bsc#1163861).\n- ext4: fix a bug in ext4_wait_for_tail_page_commit (bsc#1163841).\n- ext4: fix checksum errors with indexed dirs (bsc#1160979).\n- ext4: fix deadlock allocating crypto bounce page from mempool (bsc#1163842).\n- ext4: fix mount failure with quota configured as module (bsc#1164471).\n- ext4: Fix mount failure with quota configured as module (bsc#1164471).\n- ext4: improve explanation of a mount failure caused by a misconfigured kernel (bsc#1163843).\n- ext4, jbd2: ensure panic when aborting with zero errno (bsc#1163853).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- fscrypt: do not set policy for a dead directory (bsc#1163846).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/open.c: allow opening only regular files during execve() (bsc#1163845).\n- ftrace: Add comment to why rcu_dereference_sched() is open coded (git-fixes).\n- ftrace: Protect ftrace_graph_hash with ftrace_sync (git-fixes).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- gtp: avoid zero size hashtable (networking-stable-20_01_01).\n- gtp: do not allow adding duplicate tid and ms_addr pdp context (networking-stable-20_01_01).\n- gtp: fix an use-after-free in ipv4_pdp_find() (networking-stable-20_01_01).\n- gtp: fix wrong condition in gtp_genl_dump_pdp() (networking-stable-20_01_01).\n- hotplug/drc-info: Add code to search ibm,drc-info property (bsc#1157480 ltc#181028).\n- hv_netvsc: Fix offset usage in netvsc_send_table() (bsc#1164598).\n- hv_netvsc: Fix send_table offset in case of a host bug (bsc#1164598).\n- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1164598).\n- hv_netvsc: Fix unwanted rx_table reset (bsc#1164598).\n- hwmon: (k10temp) Add support for AMD family 17h, model 70h CPUs (bsc#1163206).\n- hwmon: (pmbus/ltc2978) Fix PMBus polling of MFR_COMMON definitions (bsc#1051510).\n- iommu/amd: Fix IOMMU perf counter clobbering during init (bsc#1162617).\n- iommu/arm-smmu-v3: Populate VMID field for CMDQ_OP_TLBI_NH_VA (bsc#1164314).\n- iommu/io-pgtable-arm: Fix race handling in split_blk_unmap() (bsc#1164115).\n- iwlwifi: do not throw error when trying to remove IGTK (bsc#1051510).\n- iwlwifi: mvm: fix NVM check for 3168 devices (bsc#1051510).\n- jbd2: clear JBD2_ABORT flag before journal_reset to update log tail info when load journal (bsc#1163862).\n- jbd2: do not clear the BH_Mapped flag when forgetting a metadata buffer (bsc#1163836).\n- jbd2: Fix possible overflow in jbd2_log_space_left() (bsc#1163860).\n- jbd2: make sure ESHUTDOWN to be recorded in the journal superblock (bsc#1163863).\n- jbd2: move the clearing of b_modified flag to the journal_unmap_buffer() (bsc#1163880).\n- jbd2: switch to use jbd2_journal_abort() when failed to submit the commit record (bsc#1163852).\n- kabi/severities: Whitelist rpaphp_get_drc_props (bsc#1157480 ltc#181028).\n- kconfig: fix broken dependency in randconfig-generated .config (bsc#1051510).\n- kernel-binary.spec.in: do not recommend firmware for kvmsmall and azure flavor (boo#1161360).\n- KVM: Clean up __kvm_gfn_to_hva_cache_init() and its callers (bsc#1133021).\n- KVM: fix spectrev1 gadgets (bsc#1164705).\n- KVM: PPC: Book3S HV: Uninit vCPU if vcore creation fails (bsc#1061840).\n- KVM: PPC: Book3S PR: Fix -Werror=return-type build failure (bsc#1061840).\n- KVM: PPC: Book3S PR: Free shared page if mmu initialization fails (bsc#1061840).\n- KVM: SVM: Override default MMIO mask if memory encryption is enabled (bsc#1162618).\n- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).\n- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).\n- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).\n- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).\n- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).\n- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).\n- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).\n- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).\n- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).\n- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).\n- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).\n- lcoking/rwsem: Add missing ACQUIRE to read_slowpath sleep loop (bsc#1050549).\n- lib: crc64: include \u0026lt;linux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- locking/rwsem: Prevent decrement of reader count before increment (bsc#1050549).\n- mac80211: Fix TKIP replay protection immediately after key setup (bsc#1051510).\n- mac80211: mesh: restrict airtime metric to peered established plinks (bsc#1051510).\n- md/raid0: Fix buffer overflow at debug print (bsc#1164051).\n- media: af9005: uninitialized variable printked (bsc#1051510).\n- media: cec: CEC 2.0-only bcast messages were ignored (git-fixes).\n- media: digitv: do not continue if remote control state can\u0027t be read (bsc#1051510).\n- media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0 (bsc#1051510).\n- media: exynos4-is: fix wrong mdev and v4l2 dev order in error path (git-fixes).\n- media: gspca: zero usb_buf (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov6650: Fix crop rectangle alignment not passed back (git-fixes).\n- media: ov6650: Fix incorrect use of JPEG colorspace (git-fixes).\n- media: pulse8-cec: fix lost cec_transmit_attempt_done() call.\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media/v4l2-core: set pages dirty upon releasing DMA buffers (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- mfd: da9062: Fix watchdog compatible string (bsc#1051510).\n- mfd: dln2: More sanity checking for endpoints (bsc#1051510).\n- mfd: rn5t618: Mark ADC control register volatile (bsc#1051510).\n- mmc: spi: Toggle SPI polarity, do not hardcode it (bsc#1051510).\n- mod_devicetable: fix PHY module format (networking-stable-19_12_28).\n- mtd: fix mtd_oobavail() incoherent returned value (bsc#1051510).\n- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1163851).\n- net: add sendmsg_locked and sendpage_locked to af_inet6 (bsc#1144162).\n- net: dst: Force 4-byte alignment of dst_metrics (networking-stable-19_12_28).\n- net: ena: fix napi handler misbehavior when the napi budget is zero (networking-stable-20_01_01).\n- net: hisilicon: Fix a BUG trigered by wrong bytes_compl (networking-stable-19_12_28).\n- net: nfc: nci: fix a possible sleep-in-atomic-context bug in nci_uart_tty_receive() (networking-stable-19_12_28).\n- net: qlogic: Fix error paths in ql_alloc_large_buffers() (networking-stable-19_12_28).\n- net: sched: correct flower port blocking (git-fixes).\n- net: usb: lan78xx: Fix suspend/resume PHY register access error (networking-stable-19_12_28).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- nvme: fix the parameter order for nvme_get_log in nvme_get_fw_slot_info (bsc#1163774).\n- PCI: Add DMA alias quirk for Intel VCA NTB (bsc#1051510).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI/IOV: Fix memory leak in pci_iov_add_virtfn() (git-fixes).\n- PCI: rpaphp: Add drc-info support for hotplug slot registration (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Annotate and correctly byte swap DRC properties (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Avoid a sometimes-uninitialized warning (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Correctly match ibm, my-drc-index to drc-name when using drc-info (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Do not rely on firmware feature to imply drc-info support (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Fix up pointer to first drc-info entry (bsc#1157480 ltc#181028).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1114279).\n- perf/x86/intel: Fix inaccurate period in context switch for auto-reload (bsc#1164315).\n- powerpc: avoid adjusting memory_limit for capture kernel memory reservation (bsc#1140025 ltc#176086).\n- powerpc: Enable support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc/papr_scm: Fix leaking \u0027bus_desc.provider_name\u0027 in some paths (bsc#1142685 ltc#179509).\n- powerpc/pseries: Add cpu DLPAR support for drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Advance pfn if section is not present in lmb_is_removable() (bsc#1065729).\n- powerpc/pseries: Allow not having ibm, hypertas-functions::hcall-multi-tce for DDW (bsc#1065729).\n- powerpc/pseries: Enable support for ibm,drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix bad drc_index_start value parsing of drc-info entry (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix drc-info mappings of logical cpus to drc-index (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix vector5 in ibm architecture vector table (bsc#1157480 ltc#181028).\n- powerpc/pseries/hotplug-memory: Change rc variable to bool (bsc#1065729).\n- powerpc/pseries: Revert support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc/pseries/vio: Fix iommu_table use-after-free refcount warning (bsc#1065729).\n- powerpc: reserve memory for capture kernel after hugepages init (bsc#1140025 ltc#176086).\n- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).\n- power: supply: ltc2941-battery-gauge: fix use-after-free (bsc#1051510).\n- pseries/drc-info: Search DRC properties for CPU indexes (bsc#1157480 ltc#181028).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- pwm: omap-dmtimer: Remove PWM chip in .remove before making it unfunctional (git-fixes).\n- pwm: Remove set but not set variable \u0027pwm\u0027 (git-fixes).\n- pxa168fb: Fix the function used to release some memory in an error (bsc#1114279)\n- qede: Fix multicast mac configuration (networking-stable-19_12_28).\n- qmi_wwan: Add support for Quectel RM500Q (bsc#1051510).\n- quota: Check that quota is not dirty before release (bsc#1163858).\n- quota: fix livelock in dquot_writeback_dquots (bsc#1163857).\n- r8152: get default setting of WOL before initializing (bsc#1051510).\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- reiserfs: Fix memory leak of journal device string (bsc#1163867).\n- reiserfs: Fix spurious unlock in reiserfs_fill_super() error handling (bsc#1163869).\n- Revert \u0027locking/pvqspinlock: Do not wait if vCPU is preempted\u0027 (bsc#1050549).\n- rpm/kabi.pl: support new (\u003e=5.4) Module.symvers format (new symbol namespace field)\n- rpm/kernel-binary.spec.in: Conflict with too old powerpc-utils (jsc#ECO-920, jsc#SLE-11054, jsc#SLE-11322).\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- rtc: cmos: Stop using shared IRQ (bsc#1051510).\n- rtc: hym8563: Return -EINVAL if the time is known to be invalid (bsc#1051510).\n- rtlwifi: Fix MAX MPDU of VHT capability (git-fixes).\n- rtlwifi: Remove redundant semicolon in wifi.h (git-fixes).\n- scsi: qla2xxx: Fix a NULL pointer dereference in an error path (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix unbound NVME response length (bsc#1157966 bsc#1158013 bsc#1157424).\n- sctp: fully initialize v4 addr in some functions (networking-stable-19_12_28).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- soc/tegra: fuse: Correct straps\u0027 address for older Tegra124 device trees (bsc#1051510).\n- soc: ti: wkup_m3_ipc: Fix race condition with rproc_boot (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- sr_vendor: support Beurer GL50 evo CD-on-a-chip devices (boo#1164632).\n- staging: vt6656: correct packet types for CTS protect, mode (bsc#1051510).\n- staging: vt6656: Fix false Tx excessive retries reporting (bsc#1051510).\n- staging: vt6656: use NULLFUCTION stack on mac80211 (bsc#1051510).\n- stop_machine: Atomically queue and wake stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption after queueing stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption when waking two stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810, bsc#1161702).\n- tcp: do not send empty skb from tcp_write_xmit() (networking-stable-20_01_01).\n- tracing: Annotate ftrace_graph_hash pointer with __rcu (git-fixes).\n- tracing: Annotate ftrace_graph_notrace_hash pointer with __rcu (git-fixes).\n- tracing: Fix tracing_stat return values in error handling paths (git-fixes).\n- tracing: Fix very unlikely race of registering two stat tracers (git-fixes).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- ubifs: do not trigger assertion on invalid no-key filename (bsc#1163850).\n- ubifs: Fix deadlock in concurrent bulk-read and writepage (bsc#1163856).\n- ubifs: Fix FS_IOC_SETFLAGS unexpectedly clearing encrypt flag (bsc#1163855).\n- ubifs: Reject unsupported ioctl flags explicitly (bsc#1163844).\n- udp: fix integer overflow while computing available space in sk_rcvbuf (networking-stable-20_01_01).\n- USB: core: fix check for duplicate endpoints (git-fixes).\n- USB: EHCI: Do not return -EPIPE when hub is disconnected (git-fixes).\n- USB: gadget: legacy: set max_speed to super-speed (bsc#1051510).\n- USB: gadget: Zero ffs_io_data (bsc#1051510).\n- USB: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- usbip: Fix error path of vhci_recv_ret_submit() (git-fixes).\n- USB: serial: option: add support for Quectel RM500Q in QDL mode (git-fixes).\n- USB: serial: option: add Telit ME910G1 0x110a composition (git-fixes).\n- USB: serial: option: add ZLP support for 0x1bc7/0x9010 (git-fixes).\n- usb-storage: Disable UAS on JMicron SATA enclosure (bsc#1051510).\n- vhost/vsock: accept only packets with the right dst_cid (networking-stable-20_01_01).\n- watchdog: max77620_wdt: fix potential build errors (bsc#1051510).\n- watchdog: rn5t618_wdt: fix module aliases (bsc#1051510).\n- watchdog: wdat_wdt: fix get_timeleft call for wdat_wdt (bsc#1162557).\n- wireless: fix enabling channel 12 for custom regulatory domain (bsc#1051510).\n- wireless: wext: avoid gcc -O3 warning (bsc#1051510).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 70h (bsc#1163206).\n- x86/cpu: Update cached HLE state on write to TSX_CTRL_CPUID_CLEAR (bsc#1162619).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/resctrl: Check monitoring static key in the MBM overflow handler (bsc#1114279).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free when deleting resource groups (bsc#1114279).\n- xen/balloon: Support xend-based toolstack take two (bsc#1065600).\n- xen: Enable interrupts when calling _cond_resched() (bsc#1065600).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-688,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-688,SUSE-SLE-Module-RT-15-SP1-2020-688",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0688-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:0688-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200688-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:0688-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006612.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050549",
        "url": "https://bugzilla.suse.com/1050549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061840",
        "url": "https://bugzilla.suse.com/1061840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088810",
        "url": "https://bugzilla.suse.com/1088810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1105392",
        "url": "https://bugzilla.suse.com/1105392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111666",
        "url": "https://bugzilla.suse.com/1111666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112504",
        "url": "https://bugzilla.suse.com/1112504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118338",
        "url": "https://bugzilla.suse.com/1118338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133147",
        "url": "https://bugzilla.suse.com/1133147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1140025",
        "url": "https://bugzilla.suse.com/1140025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1142685",
        "url": "https://bugzilla.suse.com/1142685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144162",
        "url": "https://bugzilla.suse.com/1144162"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157424",
        "url": "https://bugzilla.suse.com/1157424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157480",
        "url": "https://bugzilla.suse.com/1157480"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157966",
        "url": "https://bugzilla.suse.com/1157966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158013",
        "url": "https://bugzilla.suse.com/1158013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159271",
        "url": "https://bugzilla.suse.com/1159271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160218",
        "url": "https://bugzilla.suse.com/1160218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160979",
        "url": "https://bugzilla.suse.com/1160979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161360",
        "url": "https://bugzilla.suse.com/1161360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161702",
        "url": "https://bugzilla.suse.com/1161702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161907",
        "url": "https://bugzilla.suse.com/1161907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162557",
        "url": "https://bugzilla.suse.com/1162557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162617",
        "url": "https://bugzilla.suse.com/1162617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162618",
        "url": "https://bugzilla.suse.com/1162618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162619",
        "url": "https://bugzilla.suse.com/1162619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162623",
        "url": "https://bugzilla.suse.com/1162623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162943",
        "url": "https://bugzilla.suse.com/1162943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163206",
        "url": "https://bugzilla.suse.com/1163206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163383",
        "url": "https://bugzilla.suse.com/1163383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163384",
        "url": "https://bugzilla.suse.com/1163384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163762",
        "url": "https://bugzilla.suse.com/1163762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163774",
        "url": "https://bugzilla.suse.com/1163774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163836",
        "url": "https://bugzilla.suse.com/1163836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163840",
        "url": "https://bugzilla.suse.com/1163840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163841",
        "url": "https://bugzilla.suse.com/1163841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163842",
        "url": "https://bugzilla.suse.com/1163842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163843",
        "url": "https://bugzilla.suse.com/1163843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163844",
        "url": "https://bugzilla.suse.com/1163844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163845",
        "url": "https://bugzilla.suse.com/1163845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163846",
        "url": "https://bugzilla.suse.com/1163846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163849",
        "url": "https://bugzilla.suse.com/1163849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163850",
        "url": "https://bugzilla.suse.com/1163850"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163851",
        "url": "https://bugzilla.suse.com/1163851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163852",
        "url": "https://bugzilla.suse.com/1163852"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163853",
        "url": "https://bugzilla.suse.com/1163853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163855",
        "url": "https://bugzilla.suse.com/1163855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163856",
        "url": "https://bugzilla.suse.com/1163856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163857",
        "url": "https://bugzilla.suse.com/1163857"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163858",
        "url": "https://bugzilla.suse.com/1163858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163859",
        "url": "https://bugzilla.suse.com/1163859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163860",
        "url": "https://bugzilla.suse.com/1163860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163861",
        "url": "https://bugzilla.suse.com/1163861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163862",
        "url": "https://bugzilla.suse.com/1163862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163863",
        "url": "https://bugzilla.suse.com/1163863"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163867",
        "url": "https://bugzilla.suse.com/1163867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163869",
        "url": "https://bugzilla.suse.com/1163869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163880",
        "url": "https://bugzilla.suse.com/1163880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163971",
        "url": "https://bugzilla.suse.com/1163971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164051",
        "url": "https://bugzilla.suse.com/1164051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164069",
        "url": "https://bugzilla.suse.com/1164069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164098",
        "url": "https://bugzilla.suse.com/1164098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164115",
        "url": "https://bugzilla.suse.com/1164115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164314",
        "url": "https://bugzilla.suse.com/1164314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164315",
        "url": "https://bugzilla.suse.com/1164315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164388",
        "url": "https://bugzilla.suse.com/1164388"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164471",
        "url": "https://bugzilla.suse.com/1164471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164598",
        "url": "https://bugzilla.suse.com/1164598"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164632",
        "url": "https://bugzilla.suse.com/1164632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164705",
        "url": "https://bugzilla.suse.com/1164705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164712",
        "url": "https://bugzilla.suse.com/1164712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164727",
        "url": "https://bugzilla.suse.com/1164727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164728",
        "url": "https://bugzilla.suse.com/1164728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164729",
        "url": "https://bugzilla.suse.com/1164729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164730",
        "url": "https://bugzilla.suse.com/1164730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164731",
        "url": "https://bugzilla.suse.com/1164731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164732",
        "url": "https://bugzilla.suse.com/1164732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164733",
        "url": "https://bugzilla.suse.com/1164733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164734",
        "url": "https://bugzilla.suse.com/1164734"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164735",
        "url": "https://bugzilla.suse.com/1164735"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-03-13T14:52:54Z",
      "generator": {
        "date": "2020-03-13T14:52:54Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:0688-1",
      "initial_release_date": "2020-03-13T14:52:54Z",
      "revision_history": [
        {
          "date": "2020-03-13T14:52:54Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-4.12.14-14.20.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-4.12.14-14.20.1.noarch",
                  "product_id": "kernel-devel-rt-4.12.14-14.20.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-4.12.14-14.20.1.noarch",
                "product": {
                  "name": "kernel-source-rt-4.12.14-14.20.1.noarch",
                  "product_id": "kernel-source-rt-4.12.14-14.20.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-4.12.14-14.20.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt_debug-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt_debug-4.12.14-14.20.1.x86_64",
                  "product_id": "cluster-md-kmp-rt_debug-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-4.12.14-14.20.1.x86_64",
                  "product_id": "dlm-kmp-rt-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt_debug-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt_debug-4.12.14-14.20.1.x86_64",
                  "product_id": "dlm-kmp-rt_debug-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-4.12.14-14.20.1.x86_64",
                  "product_id": "gfs2-kmp-rt-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt_debug-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt_debug-4.12.14-14.20.1.x86_64",
                  "product_id": "gfs2-kmp-rt_debug-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kernel-rt-4.12.14-14.20.1.x86_64",
                  "product_id": "kernel-rt-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-base-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kernel-rt-base-4.12.14-14.20.1.x86_64",
                  "product_id": "kernel-rt-base-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-4.12.14-14.20.1.x86_64",
                  "product_id": "kernel-rt-devel-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-4.12.14-14.20.1.x86_64",
                  "product_id": "kernel-rt-extra-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-4.12.14-14.20.1.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-4.12.14-14.20.1.x86_64",
                  "product_id": "kernel-rt_debug-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-base-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-base-4.12.14-14.20.1.x86_64",
                  "product_id": "kernel-rt_debug-base-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-4.12.14-14.20.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-extra-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-extra-4.12.14-14.20.1.x86_64",
                  "product_id": "kernel-rt_debug-extra-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.20.1.x86_64",
                  "product_id": "kernel-rt_debug-livepatch-devel-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-4.12.14-14.20.1.x86_64",
                  "product_id": "kernel-syms-rt-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-4.12.14-14.20.1.x86_64",
                  "product_id": "kselftests-kmp-rt-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt_debug-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt_debug-4.12.14-14.20.1.x86_64",
                  "product_id": "kselftests-kmp-rt_debug-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-4.12.14-14.20.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt_debug-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt_debug-4.12.14-14.20.1.x86_64",
                  "product_id": "ocfs2-kmp-rt_debug-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-4.12.14-14.20.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-4.12.14-14.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt_debug-4.12.14-14.20.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt_debug-4.12.14-14.20.1.x86_64",
                  "product_id": "reiserfs-kmp-rt_debug-4.12.14-14.20.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Real Time Module 15 SP1",
                "product": {
                  "name": "SUSE Real Time Module 15 SP1",
                  "product_id": "SUSE Real Time Module 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-rt:15:sp1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-4.12.14-14.20.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.20.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-4.12.14-14.20.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-4.12.14-14.20.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.20.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-4.12.14-14.20.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-4.12.14-14.20.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.20.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-4.12.14-14.20.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-4.12.14-14.20.1.noarch as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.20.1.noarch"
        },
        "product_reference": "kernel-devel-rt-4.12.14-14.20.1.noarch",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-4.12.14-14.20.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.20.1.x86_64"
        },
        "product_reference": "kernel-rt-4.12.14-14.20.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-base-4.12.14-14.20.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.20.1.x86_64"
        },
        "product_reference": "kernel-rt-base-4.12.14-14.20.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-4.12.14-14.20.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.20.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-4.12.14-14.20.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-4.12.14-14.20.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.20.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-4.12.14-14.20.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-4.12.14-14.20.1.noarch as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.20.1.noarch"
        },
        "product_reference": "kernel-source-rt-4.12.14-14.20.1.noarch",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-4.12.14-14.20.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.20.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-4.12.14-14.20.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-4.12.14-14.20.1.x86_64 as component of SUSE Real Time Module 15 SP1",
          "product_id": "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.20.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-4.12.14-14.20.1.x86_64",
        "relates_to_product_reference": "SUSE Real Time Module 15 SP1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.20.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.20.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.20.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.20.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.20.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.20.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T14:52:54Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.20.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.20.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.20.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.20.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.20.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.20.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T14:52:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.20.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.20.1.noarch",
          "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.20.1.x86_64",
          "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.20.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.20.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.20.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.20.1.noarch",
            "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.20.1.x86_64",
            "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T14:52:54Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    }
  ]
}
  suse-su-2020:0580-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-14615: An information disclosure vulnerability existed due to insufficient control flow in certain data structures for some Intel(R) Processors (bnc#1160195).\n- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).\n- CVE-2019-14897: A stack-based buffer overflow was found in the Marvell WiFi driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).\n- CVE-2019-16994: A memory leak existed in sit_init_net() in net/ipv6/sit.c which might have caused denial of service, aka CID-07f12b26e21a (bnc#1161523).\n- CVE-2019-18808: A memory leak in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption), aka CID-128c66429247 (bnc#1156259).\n- CVE-2019-19036: An issue discovered in btrfs_root_node in fs/btrfs/ctree.c allowed a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero (bnc#1157692).\n- CVE-2019-19045: A memory leak in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7 (bnc#1161522).\n- CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b (bnc#1161518).\n- CVE-2019-19318: Mounting a crafted btrfs image twice could have caused a use-after-free (bnc#1158026).\n- CVE-2019-19319: A slab-out-of-bounds write access could have occured when setxattr was called after mounting of a specially crafted ext4 image (bnc#1158021).\n- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting could have led to a use-after-free in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19767: There were multiple use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163 (bnc#1159297).\n- CVE-2019-19927: A slab-out-of-bounds read access occured when mounting a crafted f2fs filesystem image and performing some operations on it (bnc#1160147).\n- CVE-2019-19965: There was a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5 (bnc#1159911).\n- CVE-2019-19966: There was a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that could have caused a denial of service, aka CID-dea37a972655 (bnc#1159841).\n- CVE-2019-20054: There was a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e (bnc#1159910).\n- CVE-2019-20095: Several memory leaks were found in drivers/net/wireless/marvell/mwifiex/cfg80211.c, aka CID-003b686ace82 (bnc#1159909).\n- CVE-2019-20096: There was a memory leak in __feat_register_sp() in net/dccp/feat.c, aka CID-1d3ff0950e2b (bnc#1159908).\n- CVE-2020-7053: There was a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c (bnc#1160966).\n- CVE-2020-8428: There was a use-after-free bug in fs/namei.c, which allowed local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9 (bnc#1162109).\n- CVE-2020-8428: There was a use-after-free bug in fs/namei.c, which allowed local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9 (bnc#1162109).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).\n- CVE-2020-8992: An issue was discovered in ext4_protect_reserved_inode in fs/ext4/block_validity.c that allowed attackers to cause a soft lockup via a crafted journal size (bnc#1164069).\n\n\nThe following non-security bugs were fixed:\n\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI / video: Add force_none quirk for Dell OptiPlex 9020M (bsc#1051510).\n- ACPI / watchdog: Fix init failure with overlapping register regions (bsc#1162557).\n- ACPI / watchdog: Set default timeout in probe (bsc#1162557).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- ACPI: PM: Avoid attaching ACPI PM domain to certain devices (bsc#1051510).\n- ACPI: video: Do not export a non working backlight interface on MSI MS-7721 boards (bsc#1051510).\n- ACPI: watchdog: Allow disabling WDAT at boot (bsc#1162557).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda - Apply sync-write workaround to old Intel platforms, too (bsc#1111666).\n- ALSA: hda - constify and cleanup static NodeID tables (bsc#1111666).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda/hdmi - Clean up Intel platform-specific fixup checks (bsc#1111666).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/realtek - Add Bass Speaker and fixed dac for bass speaker (bsc#1111666).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: hda/realtek - Add Headset Mic supported for HP cPC (bsc#1111666).\n- ALSA: hda/realtek - Add new codec supported for ALCS1200A (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for the bass speaker on Lenovo Yoga X1 7th gen (bsc#1111666).\n- ALSA: hda/realtek - Apply mic mute LED quirk for Dell E7xx laptops, too (bsc#1111666).\n- ALSA: hda/realtek - Enable the bass speaker of ASUS UX431FLC (bsc#1111666).\n- ALSA: hda/realtek - Fixed one of HP ALC671 platform Headset Mic supported (bsc#1111666).\n- ALSA: hda/realtek - More constifications (bsc#1111666).\n- ALSA: hda/realtek - Set EAPD control to default for ALC222 (bsc#1111666).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: hda: Add JasperLake PCI ID and codec vid (bsc#1111666).\n- ALSA: hda: Clear RIRB status before reading WP (bsc#1111666).\n- ALSA: hda: constify copied structure (bsc#1111666).\n- ALSA: hda: Constify snd_kcontrol_new items (bsc#1111666).\n- ALSA: hda: Constify snd_pci_quirk tables (bsc#1111666).\n- ALSA: hda: correct kernel-doc parameter descriptions (bsc#1111666).\n- ALSA: hda: hdmi - add Tigerlake support (bsc#1111666).\n- ALSA: hda: hdmi - fix pin setup on Tigerlake (bsc#1111666).\n- ALSA: hda: More constifications (bsc#1111666).\n- ALSA: hda: patch_hdmi: remove warnings with empty body (bsc#1111666).\n- ALSA: hda: patch_realtek: fix empty macro usage in if block (bsc#1111666).\n- ALSA: hda: Reset stream if DMA RUN bit not cleared (bsc#1111666).\n- ALSA: hda: Use scnprintf() for printing texts for sysfs/procfs (git-fixes).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: seq: Avoid concurrent access to queue flags (git-fixes).\n- ALSA: seq: Fix concurrent access to queue current tick/time (git-fixes).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: sh: Fix unused variable warnings (bsc#1111666).\n- ALSA: usb-audio: Apply the sample rate quirk for Bose Companion 5 (bsc#1111666).\n- ALSA: usb-audio: Fix endianess in descriptor validation (bsc#1111666).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- apparmor: fix unsigned len comparison with less than zero (git-fixes).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: cs4349: Use PM ops \u0027cs4349_runtime_pm\u0027 (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: samsung: i2s: Fix prescaler setting for the secondary DAI (bsc#1111666).\n- ASoC: sun8i-codec: Fix setting DAI data format (git-fixes).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ath10k: Correct the DMA direction for management tx buffers (bsc#1111666).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath10k: pci: Fix comment on ath10k_pci_dump_memory_sram (bsc#1111666).\n- ath10k: pci: Only dump ATH10K_MEM_REGION_TYPE_IOREG when safe (bsc#1111666).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front() (bsc#1163762).\n- bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front() (bsc#1163762).\n- bcache: add code comments for state-\u003epool in __btree_sort() (bsc#1163762).\n- bcache: add code comments for state-\u003epool in __btree_sort() (bsc#1163762).\n- bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n- bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n- bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n- bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n- bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n- bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n- bcache: add more accurate error messages in read_super() (bsc#1163762).\n- bcache: add more accurate error messages in read_super() (bsc#1163762).\n- bcache: add readahead cache policy options via sysfs interface (bsc#1163762).\n- bcache: add readahead cache policy options via sysfs interface (bsc#1163762).\n- bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n- bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (bsc#1163762).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (bsc#1163762).\n- bcache: check return value of prio_read() (bsc#1163762).\n- bcache: check return value of prio_read() (bsc#1163762).\n- bcache: deleted code comments for dead code in bch_data_insert_keys() (bsc#1163762).\n- bcache: deleted code comments for dead code in bch_data_insert_keys() (bsc#1163762).\n- bcache: do not export symbols (bsc#1163762).\n- bcache: do not export symbols (bsc#1163762).\n- bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n- bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n- bcache: fix a lost wake-up problem caused by mca_cannibalize_lock (bsc#1163762).\n- bcache: fix a lost wake-up problem caused by mca_cannibalize_lock (bsc#1163762).\n- bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n- bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n- bcache: fix deadlock in bcache_allocator (bsc#1163762).\n- bcache: fix deadlock in bcache_allocator (bsc#1163762).\n- bcache: fix incorrect data type usage in btree_flush_write() (bsc#1163762).\n- bcache: fix incorrect data type usage in btree_flush_write() (bsc#1163762).\n- bcache: fix memory corruption in bch_cache_accounting_clear() (bsc#1163762).\n- bcache: fix memory corruption in bch_cache_accounting_clear() (bsc#1163762).\n- bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n- bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n- bcache: ignore pending signals when creating gc and allocator thread (bsc#1163762, bsc#1112504).\n- bcache: ignore pending signals when creating gc and allocator thread (bsc#1163762, bsc#1112504).\n- bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n- bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n- bcache: reap c-\u003ebtree_cache_freeable from the tail in bch_mca_scan() (bsc#1163762).\n- bcache: reap c-\u003ebtree_cache_freeable from the tail in bch_mca_scan() (bsc#1163762).\n- bcache: reap from tail of c-\u003ebtree_cache in bch_mca_scan() (bsc#1163762).\n- bcache: reap from tail of c-\u003ebtree_cache in bch_mca_scan() (bsc#1163762).\n- bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n- bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n- bcache: remove member accessed from struct btree (bsc#1163762).\n- bcache: remove member accessed from struct btree (bsc#1163762).\n- bcache: remove the extra cflags for request.o (bsc#1163762).\n- bcache: remove the extra cflags for request.o (bsc#1163762).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (bsc#1163762, bsc#1112504).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (bsc#1163762, bsc#1112504).\n- bcma: remove set but not used variable \u0027sizel\u0027 (git-fixes).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1159377).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840).\n- blk-mq: make sure that line break can be printed (bsc#1159377).\n- blk-mq: make sure that line break can be printed (bsc#1164098).\n- Bluetooth: Fix race condition in hci_release_sock() (bsc#1051510).\n- bnxt: apply computed clamp value for coalece parameter (bsc#1104745).\n- bnxt_en: Fix MSIX request logic for RDMA driver (bsc#1104745 ).\n- bnxt_en: Return error if FW returns more data than dump length (bsc#1104745).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).\n- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- bpf, offload: Unlock on error in bpf_offload_dev_create() (bsc#1109837).\n- bpf/sockmap: Read psock ingress_msg before sk_receive_queue (bsc#1083647).\n- bpf: add self-check logic to liveness analysis (bsc#1160618).\n- bpf: add verifier stats and log_level bit 2 (bsc#1160618).\n- bpf: Fix incorrect verifier simulation of ARSH under ALU32 (bsc#1083647).\n- bpf: improve stacksafe state comparison (bco#1160618).\n- bpf: improve verification speed by droping states (bsc#1160618).\n- bpf: improve verification speed by not remarking live_read (bsc#1160618).\n- bpf: improve verifier branch analysis (bsc#1160618).\n- bpf: increase complexity limit and maximum program size (bsc#1160618).\n- bpf: increase verifier log limit (bsc#1160618).\n- bpf: Reject indirect var_off stack access in raw mode (bsc#1160618).\n- bpf: Reject indirect var_off stack access in unpriv mode (bco#1160618).\n- bpf: Sanity check max value for var_off stack access (bco#1160618).\n- bpf: skmsg, fix potential psock NULL pointer dereference (bsc#1109837).\n- bpf: speed up stacksafe check (bco#1160618).\n- bpf: Support variable offset stack access from helpers (bco#1160618).\n- bpf: verifier: teach the verifier to reason about the BPF_JSET instruction (bco#1160618).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_p2p_create_p2pdev() (bsc#1111666).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- brcmfmac: sdio: Fix OOB interrupt initialization on brcm43362 (bsc#1111666).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: do not double lock the subvol_sem for rename exchange (bsc#1162943).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- btrfs: fix infinite loop during fsync after rename operations (bsc#1163383).\n- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- btrfs: fix race between adding and putting tree mod seq elements and nodes (bsc#1163384).\n- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1051510).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix deadlocks in autodisconnect work (bsc#1111666).\n- cfg80211: fix memory leak in cfg80211_cqm_rssi_update (bsc#1111666).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cgroup: pids: use atomic64_t for pids-\u003elimit (bsc#1161514).\n- chardev: Avoid potential use-after-free in \u0027chrdev_open()\u0027 (bsc#1163849).\n- cifs: add support for flock (bsc#1144333).\n- cifs: Close cached root handle only if it had a lease (bsc#1144333).\n- cifs: Close open handle after interrupted close (bsc#1144333).\n- cifs: close the shared root handle on tree disconnect (bsc#1144333).\n- cifs: Do not miss cancelled OPEN responses (bsc#1144333).\n- cifs: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- cifs: fix mount option display for sec=krb5i (bsc#1161907).\n- cifs: Fix mount options set in automount (bsc#1144333).\n- cifs: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- cifs: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- cifs: Properly process SMB3 lease breaks (bsc#1144333).\n- cifs: remove set but not used variables \u0027cinode\u0027 and \u0027netfid\u0027 (bsc#1144333).\n- cifs: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: imx: clk-composite-8m: add lock to gate/mux (git-fixes).\n- clk: mmp2: Fix the order of timer mux parents (bsc#1051510).\n- clk: qcom: rcg2: Do not crash if our parent can\u0027t be found; return an error (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: sunxi-ng: add mux and pll notifiers for A64 CPU clock (bsc#1051510).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clk: tegra: Mark fuse clock as critical (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource: Prevent double add_timer_on() for watchdog_timer (bsc#1051510).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- configfs_register_group() shouldn\u0027t be (and isn\u0027t) called in rmdirable parts (bsc#1051510).\n- copy/pasted \u0027Recommends:\u0027 instead of \u0027Provides:\u0027, \u0027Obsoletes:\u0027 and \u0027Conflicts:\n- Cover up kABI breakage due to DH key verification (bsc#1155331).\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn-\u003ealg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: caam/qi2 - fix typo in algorithm\u0027s driver name (bsc#1111666).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: dh - add public key verification test (bsc#1155331).\n- crypto: dh - fix calculating encoded key size (bsc#1155331).\n- crypto: dh - fix memory leak (bsc#1155331).\n- crypto: dh - update test for public key verification (bsc#1155331).\n- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n- crypto: ecdh - add public key verification test (bsc#1155331).\n- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- Documentation: Document arm64 kpti control (bsc#1162623).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drm/amd/display: Retrain dongles when SINK_COUNT becomes non-zero (bsc#1111666).\n- drm/amd/powerplay: remove set but not used variable \u0027us_mvdd\u0027 (bsc#1111666).\n- drm/amdgpu/{uvd,vcn}: fetch ring\u0027s read_ptr after alloc (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_device_set_cg_state\u0027 (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: fix ring test failure issue during s3 in vce 3.0 (V2) (bsc#1111666).\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027invalid\u0027 (bsc#1111666).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915/gvt: Pin vgpu dma address before using (bsc#1112178)\n- drm/i915/gvt: set guest display buffer as readonly (bsc#1112178)\n- drm/i915/gvt: use vgpu lock for active state setting (bsc#1112178)\n- drm/i915/perf: add missing delay for OA muxes configuration (bsc#1111666).\n- drm/i915: Add missing include file \u003clinux/math64.h\u003e (bsc#1051510).\n- drm/i915: Call dma_set_max_seg_size() in i915_driver_hw_probe() (bsc#1111666).\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm/i915: Handle vm_mmap error during I915_GEM_MMAP ioctl with WC set (bsc#1111666).\n- drm/i915: Make sure cdclk is high enough for DP audio on VLV/CHV (bsc#1111666).\n- drm/i915: Sanity check mmap length against object size (bsc#1111666).\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/nouveau/bar/gf100: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/bar/nv50: check bar1 vmm return value (bsc#1111666).\n- drm/nouveau/mmu: qualify vmm during dtor (bsc#1111666).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/rect: Avoid division by zero (bsc#1111666).\n- drm/rect: update kerneldoc for drm_rect_clip_scaled() (bsc#1111666).\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/sun4i: hdmi: Remove duplicate cleanup calls (bsc#1113956)\n- drm/sun4i: tcon: Set min division of TCON0_DCLK to 1 (bsc#1111666).\n- drm/sun4i: tcon: Set RGB DCLK min. divider based on hardware model (bsc#1111666).\n- drm/ttm: ttm_tt_init_fields() can be static (bsc#1111666).\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n- drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable (bsc#1111666).\n- e100: Fix passing zero to \u0027PTR_ERR\u0027 warning in e100_load_ucode_wait (bsc#1051510).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- ext2: check err when partial != NULL (bsc#1163859).\n- ext4, jbd2: ensure panic when aborting with zero errno (bsc#1163853).\n- ext4: check for directory entries too close to block end (bsc#1163861).\n- ext4: fix a bug in ext4_wait_for_tail_page_commit (bsc#1163841).\n- ext4: fix checksum errors with indexed dirs (bsc#1160979).\n- ext4: fix deadlock allocating crypto bounce page from mempool (bsc#1163842).\n- ext4: fix mount failure with quota configured as module (bsc#1164471).\n- ext4: improve explanation of a mount failure caused by a misconfigured kernel (bsc#1163843).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- firestream: fix memory leaks (bsc#1051510).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- Fix partial checked out tree build ... so that bisection does not break.\n- Fix the locking in dcache_readdir() and friends (bsc#1123328).\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/open.c: allow opening only regular files during execve() (bsc#1163845).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- fscrypt: do not set policy for a dead directory (bsc#1163846).\n- ftrace: Add comment to why rcu_dereference_sched() is open coded (git-fixes).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- ftrace: Protect ftrace_graph_hash with ftrace_sync (git-fixes).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- gtp: avoid zero size hashtable (networking-stable-20_01_01).\n- gtp: do not allow adding duplicate tid and ms_addr pdp context (networking-stable-20_01_01).\n- gtp: fix an use-after-free in ipv4_pdp_find() (networking-stable-20_01_01).\n- gtp: fix wrong condition in gtp_genl_dump_pdp() (networking-stable-20_01_01).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- hotplug/drc-info: Add code to search ibm,drc-info property (bsc#1157480 ltc#181028).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (k10temp) Add support for AMD family 17h, model 70h CPUs (bsc#1163206).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- hwmon: (pmbus/ltc2978) Fix PMBus polling of MFR_COMMON definitions (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- IB/hfi1: Do not cancel unused work item (bsc#1114685 ).\n- IB/mlx5: Fix steering rule of drop and count (bsc#1103991 ).\n- IB/mlx5: Remove dead code (bsc#1103991).\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ice: fix stack leakage (bsc#1118661).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- init: add arch_call_rest_init to allow stack switching (jsc#SLE-11178).\n- init: add arch_call_rest_init to allow stack switching (jsc#SLE-11179).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- iommu/amd: Fix IOMMU perf counter clobbering during init (bsc#1162617).\n- iommu/arm-smmu-v3: Populate VMID field for CMDQ_OP_TLBI_NH_VA (bsc#1164314).\n- iommu/iova: Init the struct iova to fix the possible memleak (bsc#1160469).\n- iommu/mediatek: Correct the flush_iotlb_all callback (bsc#1160470).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: change monitor DMA to be coherent (bsc#1161243).\n- iwlwifi: clear persistence bit according to device family (bsc#1111666).\n- iwlwifi: do not throw error when trying to remove IGTK (bsc#1051510).\n- iwlwifi: mvm: fix NVM check for 3168 devices (bsc#1051510).\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- iwlwifi: trans: Clear persistence bit when starting the FW (bsc#1111666).\n- jbd2: clear JBD2_ABORT flag before journal_reset to update log tail info when load journal (bsc#1163862).\n- jbd2: do not clear the BH_Mapped flag when forgetting a metadata buffer (bsc#1163836).\n- jbd2: Fix possible overflow in jbd2_log_space_left() (bsc#1163860).\n- jbd2: make sure ESHUTDOWN to be recorded in the journal superblock (bsc#1163863).\n- jbd2: move the clearing of b_modified flag to the journal_unmap_buffer() (bsc#1163880).\n- jbd2: switch to use jbd2_journal_abort() when failed to submit the commit record (bsc#1163852).\n- kABI fixup for alloc_dax_region (bsc#1158071,bsc#1160678).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kABI/severities: Whitelist rpaphp_get_drc_props (bsc#1157480 ltc#181028).\n- kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n- kABI: protect struct sctp_ep_common (kabi).\n- kABI: Protest new fields in BPF structs (bsc#1160618).\n- kconfig: fix broken dependency in randconfig-generated .config (bsc#1051510).\n- kernel-binary.spec.in: do not recommend firmware for kvmsmall and azure flavor (boo#1161360).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n- KVM: Clean up __kvm_gfn_to_hva_cache_init() and its callers (bsc#1133021).\n- KVM: PPC: Book3S HV: Uninit vCPU if vcore creation fails (bsc#1061840).\n- KVM: PPC: Book3S PR: Fix -Werror=return-type build failure (bsc#1061840).\n- KVM: PPC: Book3S PR: Free shared page if mmu initialization fails (bsc#1061840).\n- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).\n- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).\n- KVM: SVM: Override default MMIO mask if memory encryption is enabled (bsc#1162618).\n- kvm: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- lib: crc64: include \u003clinux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- lib: crc64: include \u003clinux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- libnvdimm/namespace: Differentiate between probe mapping and runtime mapping (bsc#1153535).\n- libnvdimm/pfn: Account for PAGE_SIZE \u003e info-block-size in nd_pfn_init() (bsc#1127682 bsc#1153535 ltc#175033 ltc#181834).\n- libnvdimm: Fix devm_nsio_enable() kabi (bsc#1153535).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- livepatch: Simplify stack trace retrieval (jsc#SLE-11178).\n- livepatch: Simplify stack trace retrieval (jsc#SLE-11179).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- mac80211: fix ieee80211_txq_setup_flows() failure path (bsc#1111666).\n- mac80211: Fix TKIP replay protection immediately after key setup (bsc#1051510).\n- mac80211: mesh: restrict airtime metric to peered established plinks (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- media/v4l2-core: set pages dirty upon releasing DMA buffers (bsc#1051510).\n- media: af9005: uninitialized variable printked (bsc#1051510).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: CEC 2.0-only bcast messages were ignored (git-fixes).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: digitv: do not continue if remote control state can\u0027t be read (bsc#1051510).\n- media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0 (bsc#1051510).\n- media: exynos4-is: fix wrong mdev and v4l2 dev order in error path (git-fixes).\n- media: gspca: zero usb_buf (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov6650: Fix crop rectangle alignment not passed back (git-fixes).\n- media: ov6650: Fix incorrect use of JPEG colorspace (git-fixes).\n- media: pulse8-cec: fix lost cec_transmit_attempt_done() call.\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- mfd: da9062: Fix watchdog compatible string (bsc#1051510).\n- mfd: dln2: More sanity checking for endpoints (bsc#1051510).\n- mfd: rn5t618: Mark ADC control register volatile (bsc#1051510).\n- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b (\u0027rpm/kernel-subpackage-spec: Unify dependency handling.\u0027) Fixes: 3fd22e219f77 (\u0027rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\u0027)\n- mlxsw: spectrum_qdisc: Ignore grafting of invisible FIFO (bsc#1112374).\n- mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel (bsc#1112374).\n- mm, debug_pagealloc: do not rely on static keys too early (VM debuging functionality, bsc#1159096).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: Revert \u0027mmc: sdhci-of-esdhc: add erratum A-009204 support\u0027 (bsc#1051510).\n- mmc: sdhci: Add a quirk for broken command queuing (git-fixes).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK (git-fixes).\n- mmc: spi: Toggle SPI polarity, do not hardcode it (bsc#1051510).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- mod_devicetable: fix PHY module format (networking-stable-19_12_28).\n- mqprio: Fix out-of-bounds access in mqprio_dump (bsc#1109837).\n- mtd: fix mtd_oobavail() incoherent returned value (bsc#1051510).\n- mwifiex: delete unused mwifiex_get_intf_num() (bsc#1111666).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- mwifiex: update set_mac_address logic (bsc#1111666).\n- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1163851).\n- net, sysctl: Fix compiler warning when only cBPF is present (bsc#1109837).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx4_en: Fix wrong limitation for number of TX rings (bsc#1103989).\n- net/mlx5: Accumulate levels for chains prio namespaces (bsc#1103990).\n- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n- net/mlx5: Update the list of the PCI supported devices (bsc#1127611).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n- net/mlx5e: Query global pause state before setting prio2buffer (bsc#1103990).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n- net: dst: Force 4-byte alignment of dst_metrics (networking-stable-19_12_28).\n- net: ena: fix napi handler misbehavior when the napi budget is zero (networking-stable-20_01_01).\n- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n- net: hisilicon: Fix a BUG trigered by wrong bytes_compl (networking-stable-19_12_28).\n- net: hns3: fix ETS bandwidth validation bug (bsc#1104353 ).\n- net: nfc: nci: fix a possible sleep-in-atomic-context bug in nci_uart_tty_receive() (networking-stable-19_12_28).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: qlogic: Fix error paths in ql_alloc_large_buffers() (networking-stable-19_12_28).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net: sched: ensure opts_len \u003c= IP_TUNNEL_OPTS_MAX in act_tunnel_key (bsc#1109837).\n- net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues (bsc#1109837).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net: usb: lan78xx: Fix suspend/resume PHY register access error (networking-stable-19_12_28).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- NFC: fdp: fix incorrect free object (networking-stable-19_11_10).\n- NFC: pn533: fix bulk-message timeout (bsc#1051510).\n- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- NFC: st21nfca: fix double free (networking-stable-19_11_10).\n- nvme: fix the parameter order for nvme_get_log in nvme_get_fw_slot_info (bsc#1163774).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- PCI: Add DMA alias quirk for Intel VCA NTB (bsc#1051510).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI: rpaphp: Add drc-info support for hotplug slot registration (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Annotate and correctly byte swap DRC properties (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Avoid a sometimes-uninitialized warning (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Correctly match ibm, my-drc-index to drc-name when using drc-info (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Do not rely on firmware feature to imply drc-info support (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Fix up pointer to first drc-info entry (bsc#1157480 ltc#181028).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1114279).\n- perf/x86/intel: Fix inaccurate period in context switch for auto-reload (bsc#1164315).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctrl: cherryview: Fix irq_valid_mask calculation (bsc#1111666).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- power: supply: ltc2941-battery-gauge: fix use-after-free (bsc#1051510).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/livepatch: return -ERRNO values in save_stack_trace_tsk_reliable() (bsc#1071995 bsc#1161875).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/papr_scm: Do not enable direct map for a region by default (bsc#1129551).\n- powerpc/papr_scm: Fix leaking \u0027bus_desc.provider_name\u0027 in some paths (bsc#1142685 ltc#179509).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/pseries/hotplug-memory: Change rc variable to bool (bsc#1065729).\n- powerpc/pseries/lparcfg: Fix display of Maximum Memory (bsc#1162028 ltc#181740).\n- powerpc/pseries/vio: Fix iommu_table use-after-free refcount warning (bsc#1065729).\n- powerpc/pseries: Add cpu DLPAR support for drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Advance pfn if section is not present in lmb_is_removable() (bsc#1065729).\n- powerpc/pseries: Allow not having ibm, hypertas-functions::hcall-multi-tce for DDW (bsc#1065729).\n- powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init() (git-fixes).\n- powerpc/pseries: Enable support for ibm,drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix bad drc_index_start value parsing of drc-info entry (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix drc-info mappings of logical cpus to drc-index (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix vector5 in ibm architecture vector table (bsc#1157480 ltc#181028).\n- powerpc/pseries: Revert support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: avoid adjusting memory_limit for capture kernel memory reservation (bsc#1140025 ltc#176086).\n- powerpc: Enable support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- powerpc: reserve memory for capture kernel after hugepages init (bsc#1140025 ltc#176086).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- pseries/drc-info: Search DRC properties for CPU indexes (bsc#1157480 ltc#181028).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- pwm: omap-dmtimer: Remove PWM chip in .remove before making it unfunctional (git-fixes).\n- pwm: Remove set but not set variable \u0027pwm\u0027 (git-fixes).\n- pxa168fb: Fix the function used to release some memory in an error (bsc#1114279)\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qede: Fix multicast mac configuration (networking-stable-19_12_28).\n- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).\n- qmi_wwan: Add support for Quectel RM500Q (bsc#1051510).\n- quota: Check that quota is not dirty before release (bsc#1163858).\n- quota: fix livelock in dquot_writeback_dquots (bsc#1163857).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- r8152: get default setting of WOL before initializing (bsc#1051510).\n- random: move FIPS continuous test to output functions (bsc#1155334).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- RDMA/hns: Bugfix for qpc/cqc timer configuration (bsc#1104427 bsc#1126206).\n- RDMA/hns: Correct the value of srq_desc_size (bsc#1104427 ).\n- RDMA/hns: Fix to support 64K page for srq (bsc#1104427 ).\n- RDMA/hns: Prevent memory leaks of eq-\u003ebuf_list (bsc#1104427 ).\n- README.BRANCH: Update the branch name to cve/linux-4.12\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- reiserfs: Fix memory leak of journal device string (bsc#1163867).\n- reiserfs: Fix spurious unlock in reiserfs_fill_super() error handling (bsc#1163869).\n- rpm/kabi.pl: support new (\u003e=5.4) Module.symvers format (new symbol namespace field)\n- rpm/kernel-binary.spec.in: Conflict with too old powerpc-utils (jsc#ECO-920, jsc#SLE-11054, jsc#SLE-11322).\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages\n- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n- rpm/kernel-subpackage-spec: fix kernel-default-base build There were some issues with recent changes to subpackage dependencies handling:\n- rpm/kernel-subpackage-spec: Unify dependency handling.\n- rpm/modules.fips: update module list (bsc#1157853)\n- rsi_91x_usb: fix interface sanity check (git-fixes).\n- rtc: cmos: Stop using shared IRQ (bsc#1051510).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: hym8563: Return -EINVAL if the time is known to be invalid (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in \u0027max8997_rtc_read_alarm()\u0027 (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf\u0027s type to u8 in s35390a_init (bsc#1051510).\n- rtl8xxxu: fix interface sanity check (git-fixes).\n- s390/ftrace: generate traced function stack frame (jsc#SLE-11178 jsc#SLE-11179).\n- s390/ftrace: save traced function caller (jsc#SLE-11178).\n- s390/ftrace: save traced function caller (jsc#SLE-11179).\n- s390/ftrace: use HAVE_FUNCTION_GRAPH_RET_ADDR_PTR (jsc#SLE-11178).\n- s390/ftrace: use HAVE_FUNCTION_GRAPH_RET_ADDR_PTR (jsc#SLE-11179).\n- s390/head64: correct init_task stack setup (jsc#SLE-11178).\n- s390/head64: correct init_task stack setup (jsc#SLE-11179).\n- s390/kasan: avoid false positives during stack unwind (jsc#SLE-11178).\n- s390/kasan: avoid false positives during stack unwind (jsc#SLE-11179).\n- s390/kasan: avoid report in get_wchan (jsc#SLE-11178).\n- s390/kasan: avoid report in get_wchan (jsc#SLE-11179).\n- s390/livepatch: Implement reliable stack tracing for the consistency model (jsc#SLE-11178).\n- s390/livepatch: Implement reliable stack tracing for the consistency model (jsc#SLE-11179).\n- s390/process: avoid custom stack unwinding in get_wchan (jsc#SLE-11178).\n- s390/process: avoid custom stack unwinding in get_wchan (jsc#SLE-11179).\n- s390/stacktrace: use common arch_stack_walk infrastructure (jsc#SLE-11178).\n- s390/stacktrace: use common arch_stack_walk infrastructure (jsc#SLE-11179).\n- s390/suspend: fix stack setup in swsusp_arch_suspend (jsc#SLE-11178).\n- s390/suspend: fix stack setup in swsusp_arch_suspend (jsc#SLE-11179).\n- s390/test_unwind: print verbose unwinding results (jsc#SLE-11178).\n- s390/test_unwind: print verbose unwinding results (jsc#SLE-11179).\n- s390/unwind: add stack pointer alignment sanity checks (jsc#SLE-11178).\n- s390/unwind: add stack pointer alignment sanity checks (jsc#SLE-11179).\n- s390/unwind: always inline get_stack_pointer (jsc#SLE-11178).\n- s390/unwind: always inline get_stack_pointer (jsc#SLE-11179).\n- s390/unwind: avoid int overflow in outside_of_stack (jsc#SLE-11178).\n- s390/unwind: avoid int overflow in outside_of_stack (jsc#SLE-11179).\n- s390/unwind: cleanup unused READ_ONCE_TASK_STACK (jsc#SLE-11178).\n- s390/unwind: cleanup unused READ_ONCE_TASK_STACK (jsc#SLE-11179).\n- s390/unwind: correct stack switching during unwind (jsc#SLE-11178).\n- s390/unwind: correct stack switching during unwind (jsc#SLE-11179).\n- s390/unwind: drop unnecessary code around calling ftrace_graph_ret_addr() (jsc#SLE-11178).\n- s390/unwind: drop unnecessary code around calling ftrace_graph_ret_addr() (jsc#SLE-11179).\n- s390/unwind: filter out unreliable bogus %r14 (jsc#SLE-11178).\n- s390/unwind: filter out unreliable bogus %r14 (jsc#SLE-11179).\n- s390/unwind: fix get_stack_pointer(NULL, NULL) (jsc#SLE-11178).\n- s390/unwind: fix get_stack_pointer(NULL, NULL) (jsc#SLE-11179).\n- s390/unwind: fix mixing regs and sp (jsc#SLE-11178).\n- s390/unwind: fix mixing regs and sp (jsc#SLE-11179).\n- s390/unwind: introduce stack unwind API (jsc#SLE-11178).\n- s390/unwind: introduce stack unwind API (jsc#SLE-11179).\n- s390/unwind: make reuse_sp default when unwinding pt_regs (jsc#SLE-11178).\n- s390/unwind: make reuse_sp default when unwinding pt_regs (jsc#SLE-11179).\n- s390/unwind: remove stack recursion warning (jsc#SLE-11178).\n- s390/unwind: remove stack recursion warning (jsc#SLE-11179).\n- s390/unwind: report an error if pt_regs are not on stack (jsc#SLE-11178).\n- s390/unwind: report an error if pt_regs are not on stack (jsc#SLE-11179).\n- s390/unwind: start unwinding from reliable state (jsc#SLE-11178).\n- s390/unwind: start unwinding from reliable state (jsc#SLE-11179).\n- s390/unwind: stop gracefully at task pt_regs (jsc#SLE-11178).\n- s390/unwind: stop gracefully at task pt_regs (jsc#SLE-11179).\n- s390/unwind: stop gracefully at user mode pt_regs in irq stack (jsc#SLE-11178).\n- s390/unwind: stop gracefully at user mode pt_regs in irq stack (jsc#SLE-11179).\n- s390/unwind: unify task is current checks (jsc#SLE-11178).\n- s390/unwind: unify task is current checks (jsc#SLE-11179).\n- s390: add stack switch helper (jsc#SLE-11178).\n- s390: add stack switch helper (jsc#SLE-11179).\n- s390: add support for virtually mapped kernel stacks (jsc#SLE-11178).\n- s390: add support for virtually mapped kernel stacks (jsc#SLE-11179).\n- s390: always inline current_stack_pointer() (jsc#SLE-11178).\n- s390: always inline current_stack_pointer() (jsc#SLE-11179).\n- s390: always inline disabled_wait (jsc#SLE-11178).\n- s390: always inline disabled_wait (jsc#SLE-11179).\n- s390: avoid misusing CALL_ON_STACK for task stack setup (jsc#SLE-11178).\n- s390: avoid misusing CALL_ON_STACK for task stack setup (jsc#SLE-11179).\n- s390: clean up stacks setup (jsc#SLE-11178).\n- s390: clean up stacks setup (jsc#SLE-11179).\n- s390: correct CALL_ON_STACK back_chain saving (jsc#SLE-11178).\n- s390: correct CALL_ON_STACK back_chain saving (jsc#SLE-11179).\n- s390: disable preemption when switching to nodat stack with CALL_ON_STACK (jsc#SLE-11178).\n- s390: disable preemption when switching to nodat stack with CALL_ON_STACK (jsc#SLE-11179).\n- s390: fine-tune stack switch helper (jsc#SLE-11178).\n- s390: fine-tune stack switch helper (jsc#SLE-11179).\n- s390: fix register clobbering in CALL_ON_STACK (jsc#SLE-11178).\n- s390: fix register clobbering in CALL_ON_STACK (jsc#SLE-11179).\n- s390: kabi workaround for ftrace_ret_stack (jsc#SLE-11178).\n- s390: kabi workaround for ftrace_ret_stack (jsc#SLE-11179).\n- s390: kabi workaround for lowcore changes due to vmap stack (jsc#SLE-11178).\n- s390: kabi workaround for lowcore changes due to vmap stack (jsc#SLE-11179).\n- s390: kabi workaround for reliable stack tracing (jsc#SLE-11178).\n- s390: kabi workaround for reliable stack tracing (jsc#SLE-11179).\n- s390: preserve kabi for stack unwind API (jsc#SLE-11178).\n- s390: preserve kabi for stack unwind API (jsc#SLE-11179).\n- s390: unify stack size definitions (jsc#SLE-11178).\n- s390: unify stack size definitions (jsc#SLE-11179).\n- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1154601).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Fix a NULL pointer dereference in an error path (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix unbound NVME response length (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- sctp: fully initialize v4 addr in some functions (networking-stable-19_12_28).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- sfc: Remove \u0027PCIE error reporting unavailable\u0027 (bsc#1161472).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- smb3: Fix persistent handles reconnect (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: remove confusing dmesg when mounting with encryption (\u0027seal\u0027) (bsc#1144333).\n- soc/tegra: fuse: Correct straps\u0027 address for older Tegra124 device trees (bsc#1051510).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- soc: ti: wkup_m3_ipc: Fix race condition with rproc_boot (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- stacktrace: Do not skip first entry on noncurrent tasks (jsc#SLE-11178).\n- stacktrace: Do not skip first entry on noncurrent tasks (jsc#SLE-11179).\n- stacktrace: Force USER_DS for stack_trace_save_user() (jsc#SLE-11178).\n- stacktrace: Force USER_DS for stack_trace_save_user() (jsc#SLE-11179).\n- stacktrace: Get rid of unneeded \u0027!!\u0027 pattern (jsc#SLE-11178).\n- stacktrace: Get rid of unneeded \u0027!!\u0027 pattern (jsc#SLE-11179).\n- stacktrace: Provide common infrastructure (jsc#SLE-11178).\n- stacktrace: Provide common infrastructure (jsc#SLE-11179).\n- stacktrace: Provide helpers for common stack trace operations (jsc#SLE-11178).\n- stacktrace: Provide helpers for common stack trace operations (jsc#SLE-11179).\n- stacktrace: Unbreak stack_trace_save_tsk_reliable() (jsc#SLE-11178).\n- stacktrace: Unbreak stack_trace_save_tsk_reliable() (jsc#SLE-11179).\n- stacktrace: Use PF_KTHREAD to check for kernel threads (jsc#SLE-11178).\n- stacktrace: Use PF_KTHREAD to check for kernel threads (jsc#SLE-11179).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: vt6656: correct packet types for CTS protect, mode (bsc#1051510).\n- staging: vt6656: Fix false Tx excessive retries reporting (bsc#1051510).\n- staging: vt6656: use NULLFUCTION stack on mac80211 (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810, bsc#1161702).\n- stop_machine: Atomically queue and wake stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption after queueing stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption when waking two stopper threads (bsc#1088810, bsc#1161702).\n- swiotlb: do not panic on mapping failures (bsc#1162171).\n- swiotlb: remove the overflow buffer (bsc#1162171).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1160560).\n- tcp: do not send empty skb from tcp_write_xmit() (networking-stable-20_01_01).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- Temporary workaround for bsc#1159096 should no longer be needed.\n- tracing: Annotate ftrace_graph_hash pointer with __rcu (git-fixes).\n- tracing: Annotate ftrace_graph_notrace_hash pointer with __rcu (git-fixes).\n- tracing: Cleanup stack trace code (jsc#SLE-11178).\n- tracing: Cleanup stack trace code (jsc#SLE-11179).\n- tracing: Fix tracing_stat return values in error handling paths (git-fixes).\n- tracing: Fix very unlikely race of registering two stat tracers (git-fixes).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- ubifs: do not trigger assertion on invalid no-key filename (bsc#1163850).\n- ubifs: Fix deadlock in concurrent bulk-read and writepage (bsc#1163856).\n- ubifs: Fix FS_IOC_SETFLAGS unexpectedly clearing encrypt flag (bsc#1163855).\n- ubifs: Reject unsupported ioctl flags explicitly (bsc#1163844).\n- udp: fix integer overflow while computing available space in sk_rcvbuf (networking-stable-20_01_01).\n- usb-storage: Disable UAS on JMicron SATA enclosure (bsc#1051510).\n- usb: adutux: fix interface sanity check (bsc#1051510).\n- usb: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- usb: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- usb: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- usb: core: fix check for duplicate endpoints (git-fixes).\n- usb: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- usb: core: urb: fix URB structure initialization function (bsc#1051510).\n- usb: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- usb: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- usb: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- usb: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- usb: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- usb: EHCI: Do not return -EPIPE when hub is disconnected (git-fixes).\n- usb: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).\n- usb: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- usb: gadget: legacy: set max_speed to super-speed (bsc#1051510).\n- usb: gadget: pch_udc: fix use after free (bsc#1051510).\n- usb: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- usb: gadget: Zero ffs_io_data (bsc#1051510).\n- usb: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- usb: idmouse: fix interface sanity checks (bsc#1051510).\n- usb: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n- usb: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- usb: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- usb: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- usb: roles: fix a potential use after free (git-fixes).\n- usb: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- usb: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- usb: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n- usb: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- usb: serial: io_edgeport: use irqsave() in USB\u0027s complete callback (bsc#1051510).\n- usb: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- usb: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- usb: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- usb: serial: keyspan: handle unbound ports (bsc#1051510).\n- usb: serial: opticon: fix control-message timeouts (bsc#1051510).\n- usb: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- usb: serial: option: add support for Quectel RM500Q in QDL mode (git-fixes).\n- usb: serial: option: add Telit ME910G1 0x110a composition (git-fixes).\n- usb: serial: option: add ZLP support for 0x1bc7/0x9010 (git-fixes).\n- usb: serial: quatech2: handle unbound ports (bsc#1051510).\n- usb: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- usb: serial: suppress driver bind attributes (bsc#1051510).\n- usb: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- usb: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- usb: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- usb: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- usb: xhci: only set D3hot for pci device (bsc#1051510).\n- usbip: Fix error path of vhci_recv_ret_submit() (git-fixes).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- vhost/vsock: accept only packets with the right dst_cid (networking-stable-20_01_01).\n- virtio_ring: fix unmap of indirect descriptors (bsc#1162171).\n- watchdog: max77620_wdt: fix potential build errors (bsc#1051510).\n- watchdog: rn5t618_wdt: fix module aliases (bsc#1051510).\n- watchdog: wdat_wdt: fix get_timeleft call for wdat_wdt (bsc#1162557).\n- wireless: fix enabling channel 12 for custom regulatory domain (bsc#1051510).\n- wireless: wext: avoid gcc -O3 warning (bsc#1051510).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 70h (bsc#1163206).\n- x86/cpu: Update cached HLE state on write to TSX_CTRL_CPUID_CLEAR (bsc#1162619).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/resctrl: Check monitoring static key in the MBM overflow handler (bsc#1114279).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free when deleting resource groups (bsc#1114279).\n- x86/resctrl: Prevent possible overrun during bitmap operations (bsc#1114648).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xen/balloon: Support xend-based toolstack take two (bsc#1065600).\n- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfrm: Fix sa selector validation (bsc#1156609).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-580,SUSE-SLE-HA-12-SP5-2020-580,SUSE-SLE-Live-Patching-12-SP5-2020-580,SUSE-SLE-SDK-12-SP5-2020-580,SUSE-SLE-SERVER-12-SP5-2020-580,SUSE-SLE-WE-12-SP5-2020-580",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0580-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:0580-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200580-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:0580-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1046303",
        "url": "https://bugzilla.suse.com/1046303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050244",
        "url": "https://bugzilla.suse.com/1050244"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051858",
        "url": "https://bugzilla.suse.com/1051858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061840",
        "url": "https://bugzilla.suse.com/1061840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1083647",
        "url": "https://bugzilla.suse.com/1083647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085030",
        "url": "https://bugzilla.suse.com/1085030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086301",
        "url": "https://bugzilla.suse.com/1086301"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086313",
        "url": "https://bugzilla.suse.com/1086313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086314",
        "url": "https://bugzilla.suse.com/1086314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088810",
        "url": "https://bugzilla.suse.com/1088810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103989",
        "url": "https://bugzilla.suse.com/1103989"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103990",
        "url": "https://bugzilla.suse.com/1103990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103991",
        "url": "https://bugzilla.suse.com/1103991"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104353",
        "url": "https://bugzilla.suse.com/1104353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104427",
        "url": "https://bugzilla.suse.com/1104427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104745",
        "url": "https://bugzilla.suse.com/1104745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1105392",
        "url": "https://bugzilla.suse.com/1105392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1109837",
        "url": "https://bugzilla.suse.com/1109837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111666",
        "url": "https://bugzilla.suse.com/1111666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112374",
        "url": "https://bugzilla.suse.com/1112374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112504",
        "url": "https://bugzilla.suse.com/1112504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113956",
        "url": "https://bugzilla.suse.com/1113956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114648",
        "url": "https://bugzilla.suse.com/1114648"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114685",
        "url": "https://bugzilla.suse.com/1114685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118661",
        "url": "https://bugzilla.suse.com/1118661"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1123328",
        "url": "https://bugzilla.suse.com/1123328"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126206",
        "url": "https://bugzilla.suse.com/1126206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127371",
        "url": "https://bugzilla.suse.com/1127371"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127611",
        "url": "https://bugzilla.suse.com/1127611"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127682",
        "url": "https://bugzilla.suse.com/1127682"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129551",
        "url": "https://bugzilla.suse.com/1129551"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133147",
        "url": "https://bugzilla.suse.com/1133147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1134973",
        "url": "https://bugzilla.suse.com/1134973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1140025",
        "url": "https://bugzilla.suse.com/1140025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1142685",
        "url": "https://bugzilla.suse.com/1142685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1143959",
        "url": "https://bugzilla.suse.com/1143959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144333",
        "url": "https://bugzilla.suse.com/1144333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151910",
        "url": "https://bugzilla.suse.com/1151910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151927",
        "url": "https://bugzilla.suse.com/1151927"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153535",
        "url": "https://bugzilla.suse.com/1153535"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153917",
        "url": "https://bugzilla.suse.com/1153917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154243",
        "url": "https://bugzilla.suse.com/1154243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154601",
        "url": "https://bugzilla.suse.com/1154601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155331",
        "url": "https://bugzilla.suse.com/1155331"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155334",
        "url": "https://bugzilla.suse.com/1155334"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156259",
        "url": "https://bugzilla.suse.com/1156259"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156286",
        "url": "https://bugzilla.suse.com/1156286"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156609",
        "url": "https://bugzilla.suse.com/1156609"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157155",
        "url": "https://bugzilla.suse.com/1157155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157157",
        "url": "https://bugzilla.suse.com/1157157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157424",
        "url": "https://bugzilla.suse.com/1157424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157480",
        "url": "https://bugzilla.suse.com/1157480"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157692",
        "url": "https://bugzilla.suse.com/1157692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157853",
        "url": "https://bugzilla.suse.com/1157853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157966",
        "url": "https://bugzilla.suse.com/1157966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158013",
        "url": "https://bugzilla.suse.com/1158013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158021",
        "url": "https://bugzilla.suse.com/1158021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158026",
        "url": "https://bugzilla.suse.com/1158026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158071",
        "url": "https://bugzilla.suse.com/1158071"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158819",
        "url": "https://bugzilla.suse.com/1158819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159028",
        "url": "https://bugzilla.suse.com/1159028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159096",
        "url": "https://bugzilla.suse.com/1159096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159271",
        "url": "https://bugzilla.suse.com/1159271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159297",
        "url": "https://bugzilla.suse.com/1159297"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159377",
        "url": "https://bugzilla.suse.com/1159377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159394",
        "url": "https://bugzilla.suse.com/1159394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159483",
        "url": "https://bugzilla.suse.com/1159483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159484",
        "url": "https://bugzilla.suse.com/1159484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159500",
        "url": "https://bugzilla.suse.com/1159500"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159569",
        "url": "https://bugzilla.suse.com/1159569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159588",
        "url": "https://bugzilla.suse.com/1159588"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159841",
        "url": "https://bugzilla.suse.com/1159841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159908",
        "url": "https://bugzilla.suse.com/1159908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159909",
        "url": "https://bugzilla.suse.com/1159909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159910",
        "url": "https://bugzilla.suse.com/1159910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159911",
        "url": "https://bugzilla.suse.com/1159911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159955",
        "url": "https://bugzilla.suse.com/1159955"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160147",
        "url": "https://bugzilla.suse.com/1160147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160195",
        "url": "https://bugzilla.suse.com/1160195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160210",
        "url": "https://bugzilla.suse.com/1160210"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160211",
        "url": "https://bugzilla.suse.com/1160211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160218",
        "url": "https://bugzilla.suse.com/1160218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160433",
        "url": "https://bugzilla.suse.com/1160433"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160442",
        "url": "https://bugzilla.suse.com/1160442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160469",
        "url": "https://bugzilla.suse.com/1160469"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160470",
        "url": "https://bugzilla.suse.com/1160470"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160476",
        "url": "https://bugzilla.suse.com/1160476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160560",
        "url": "https://bugzilla.suse.com/1160560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160618",
        "url": "https://bugzilla.suse.com/1160618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160678",
        "url": "https://bugzilla.suse.com/1160678"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160755",
        "url": "https://bugzilla.suse.com/1160755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160756",
        "url": "https://bugzilla.suse.com/1160756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160784",
        "url": "https://bugzilla.suse.com/1160784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160787",
        "url": "https://bugzilla.suse.com/1160787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160802",
        "url": "https://bugzilla.suse.com/1160802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160803",
        "url": "https://bugzilla.suse.com/1160803"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160804",
        "url": "https://bugzilla.suse.com/1160804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160917",
        "url": "https://bugzilla.suse.com/1160917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160966",
        "url": "https://bugzilla.suse.com/1160966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160979",
        "url": "https://bugzilla.suse.com/1160979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161087",
        "url": "https://bugzilla.suse.com/1161087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161243",
        "url": "https://bugzilla.suse.com/1161243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161360",
        "url": "https://bugzilla.suse.com/1161360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161472",
        "url": "https://bugzilla.suse.com/1161472"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161514",
        "url": "https://bugzilla.suse.com/1161514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161518",
        "url": "https://bugzilla.suse.com/1161518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161522",
        "url": "https://bugzilla.suse.com/1161522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161523",
        "url": "https://bugzilla.suse.com/1161523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161549",
        "url": "https://bugzilla.suse.com/1161549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161552",
        "url": "https://bugzilla.suse.com/1161552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161674",
        "url": "https://bugzilla.suse.com/1161674"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161702",
        "url": "https://bugzilla.suse.com/1161702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161875",
        "url": "https://bugzilla.suse.com/1161875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161907",
        "url": "https://bugzilla.suse.com/1161907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161931",
        "url": "https://bugzilla.suse.com/1161931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161933",
        "url": "https://bugzilla.suse.com/1161933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161934",
        "url": "https://bugzilla.suse.com/1161934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161935",
        "url": "https://bugzilla.suse.com/1161935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161936",
        "url": "https://bugzilla.suse.com/1161936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161937",
        "url": "https://bugzilla.suse.com/1161937"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162028",
        "url": "https://bugzilla.suse.com/1162028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162067",
        "url": "https://bugzilla.suse.com/1162067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162109",
        "url": "https://bugzilla.suse.com/1162109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162139",
        "url": "https://bugzilla.suse.com/1162139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162171",
        "url": "https://bugzilla.suse.com/1162171"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162557",
        "url": "https://bugzilla.suse.com/1162557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162617",
        "url": "https://bugzilla.suse.com/1162617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162618",
        "url": "https://bugzilla.suse.com/1162618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162619",
        "url": "https://bugzilla.suse.com/1162619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162623",
        "url": "https://bugzilla.suse.com/1162623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162943",
        "url": "https://bugzilla.suse.com/1162943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163206",
        "url": "https://bugzilla.suse.com/1163206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163383",
        "url": "https://bugzilla.suse.com/1163383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163384",
        "url": "https://bugzilla.suse.com/1163384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163762",
        "url": "https://bugzilla.suse.com/1163762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163774",
        "url": "https://bugzilla.suse.com/1163774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163836",
        "url": "https://bugzilla.suse.com/1163836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163840",
        "url": "https://bugzilla.suse.com/1163840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163841",
        "url": "https://bugzilla.suse.com/1163841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163842",
        "url": "https://bugzilla.suse.com/1163842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163843",
        "url": "https://bugzilla.suse.com/1163843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163844",
        "url": "https://bugzilla.suse.com/1163844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163845",
        "url": "https://bugzilla.suse.com/1163845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163846",
        "url": "https://bugzilla.suse.com/1163846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163849",
        "url": "https://bugzilla.suse.com/1163849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163850",
        "url": "https://bugzilla.suse.com/1163850"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163851",
        "url": "https://bugzilla.suse.com/1163851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163852",
        "url": "https://bugzilla.suse.com/1163852"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163853",
        "url": "https://bugzilla.suse.com/1163853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163855",
        "url": "https://bugzilla.suse.com/1163855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163856",
        "url": "https://bugzilla.suse.com/1163856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163857",
        "url": "https://bugzilla.suse.com/1163857"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163858",
        "url": "https://bugzilla.suse.com/1163858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163859",
        "url": "https://bugzilla.suse.com/1163859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163860",
        "url": "https://bugzilla.suse.com/1163860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163861",
        "url": "https://bugzilla.suse.com/1163861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163862",
        "url": "https://bugzilla.suse.com/1163862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163863",
        "url": "https://bugzilla.suse.com/1163863"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163867",
        "url": "https://bugzilla.suse.com/1163867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163869",
        "url": "https://bugzilla.suse.com/1163869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163880",
        "url": "https://bugzilla.suse.com/1163880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164069",
        "url": "https://bugzilla.suse.com/1164069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164098",
        "url": "https://bugzilla.suse.com/1164098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164314",
        "url": "https://bugzilla.suse.com/1164314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164315",
        "url": "https://bugzilla.suse.com/1164315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164471",
        "url": "https://bugzilla.suse.com/1164471"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14615 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14897 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16994 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16994/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18808 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19036 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19045 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19318 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19318/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19319 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19319/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19447 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19447/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19767 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19927 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19927/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19965 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19966 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20095 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20096 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-7053 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-7053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8428 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8428/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-03-04T08:46:21Z",
      "generator": {
        "date": "2020-03-04T08:46:21Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:0580-1",
      "initial_release_date": "2020-03-04T08:46:21Z",
      "revision_history": [
        {
          "date": "2020-03-04T08:46:21Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.17.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.17.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.17.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-default-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-122.17.1.aarch64",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.17.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.17.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.17.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.17.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.17.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-122.17.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-122.17.1.noarch",
                  "product_id": "kernel-devel-4.12.14-122.17.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-122.17.2.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-122.17.2.noarch",
                  "product_id": "kernel-docs-4.12.14-122.17.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-122.17.2.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-122.17.2.noarch",
                  "product_id": "kernel-docs-html-4.12.14-122.17.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-122.17.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-122.17.1.noarch",
                  "product_id": "kernel-macros-4.12.14-122.17.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-122.17.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-122.17.1.noarch",
                  "product_id": "kernel-source-4.12.14-122.17.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-122.17.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-122.17.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-122.17.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.17.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-debug-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-devel-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-debug-kgraft-devel-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-debug-kgraft-devel-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-default-kgraft-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-122.17.1.ppc64le",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.17.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-122.17.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.17.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.17.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.17.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.17.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-default-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-default-kgraft-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-syms-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-122.17.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.17.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-122.17.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.17.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.17.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.17.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.17.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.17.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-debug-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-devel-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-debug-kgraft-devel-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-debug-kgraft-devel-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-default-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-kgraft-devel-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-kgraft-devel-4.12.14-122.17.1.x86_64",
                  "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.17.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.17.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.17.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-122.17.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-122.17.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-122.17.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-122.17.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x"
        },
        "product_reference": "kernel-obs-build-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.17.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-122.17.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.17.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.17.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.17.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.17.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.17.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.17.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.17.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.17.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.17.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.17.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.17.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-122.17.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.17.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-122.17.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.17.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.17.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.17.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.17.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.17.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.17.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.17.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.17.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-122.17.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-122.17.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.17.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-122.17.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-4.12.14-122.17.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
          "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        },
        "product_reference": "kernel-default-extra-4.12.14-122.17.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-14615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14615",
          "url": "https://www.suse.com/security/cve/CVE-2019-14615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160195 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1160195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165881 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1165881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14615"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-14897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14897",
          "url": "https://www.suse.com/security/cve/CVE-2019-14897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157155 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1157155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160467 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14897"
    },
    {
      "cve": "CVE-2019-16994",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16994"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16994",
          "url": "https://www.suse.com/security/cve/CVE-2019-16994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161523 for CVE-2019-16994",
          "url": "https://bugzilla.suse.com/1161523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16994"
    },
    {
      "cve": "CVE-2019-18808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18808",
          "url": "https://www.suse.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156259 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1156259"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18808"
    },
    {
      "cve": "CVE-2019-19036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19036",
          "url": "https://www.suse.com/security/cve/CVE-2019-19036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157692 for CVE-2019-19036",
          "url": "https://bugzilla.suse.com/1157692"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19036"
    },
    {
      "cve": "CVE-2019-19045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19045",
          "url": "https://www.suse.com/security/cve/CVE-2019-19045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161522 for CVE-2019-19045",
          "url": "https://bugzilla.suse.com/1161522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19045"
    },
    {
      "cve": "CVE-2019-19054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19054",
          "url": "https://www.suse.com/security/cve/CVE-2019-19054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161518 for CVE-2019-19054",
          "url": "https://bugzilla.suse.com/1161518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19054"
    },
    {
      "cve": "CVE-2019-19318",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19318"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19318",
          "url": "https://www.suse.com/security/cve/CVE-2019-19318"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158026 for CVE-2019-19318",
          "url": "https://bugzilla.suse.com/1158026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19318"
    },
    {
      "cve": "CVE-2019-19319",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19319"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19319",
          "url": "https://www.suse.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158021 for CVE-2019-19319",
          "url": "https://bugzilla.suse.com/1158021"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19319"
    },
    {
      "cve": "CVE-2019-19447",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19447"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19447",
          "url": "https://www.suse.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158819 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1158819"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173869 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1173869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-19447"
    },
    {
      "cve": "CVE-2019-19767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19767",
          "url": "https://www.suse.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159297 for CVE-2019-19767",
          "url": "https://bugzilla.suse.com/1159297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19767"
    },
    {
      "cve": "CVE-2019-19927",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19927"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19927",
          "url": "https://www.suse.com/security/cve/CVE-2019-19927"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160147 for CVE-2019-19927",
          "url": "https://bugzilla.suse.com/1160147"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19927"
    },
    {
      "cve": "CVE-2019-19965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19965",
          "url": "https://www.suse.com/security/cve/CVE-2019-19965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159911 for CVE-2019-19965",
          "url": "https://bugzilla.suse.com/1159911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19965"
    },
    {
      "cve": "CVE-2019-19966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19966",
          "url": "https://www.suse.com/security/cve/CVE-2019-19966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159841 for CVE-2019-19966",
          "url": "https://bugzilla.suse.com/1159841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19966"
    },
    {
      "cve": "CVE-2019-20054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20054",
          "url": "https://www.suse.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159910 for CVE-2019-20054",
          "url": "https://bugzilla.suse.com/1159910"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20054"
    },
    {
      "cve": "CVE-2019-20095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20095",
          "url": "https://www.suse.com/security/cve/CVE-2019-20095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159909 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159914 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-20095"
    },
    {
      "cve": "CVE-2019-20096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20096",
          "url": "https://www.suse.com/security/cve/CVE-2019-20096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159908 for CVE-2019-20096",
          "url": "https://bugzilla.suse.com/1159908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20096"
    },
    {
      "cve": "CVE-2020-7053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-7053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-7053",
          "url": "https://www.suse.com/security/cve/CVE-2020-7053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160966 for CVE-2020-7053",
          "url": "https://bugzilla.suse.com/1160966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-7053"
    },
    {
      "cve": "CVE-2020-8428",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8428"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8428",
          "url": "https://www.suse.com/security/cve/CVE-2020-8428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162109 for CVE-2020-8428",
          "url": "https://bugzilla.suse.com/1162109"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8428"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_17-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.17.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.17.2.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.17.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.17.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-04T08:46:21Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    }
  ]
}
  suse-su-2020:0511-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-14615: An information disclosure vulnerability existed due to insufficient control flow in certain data structures for some Intel(R) Processors (bnc#1160195).\n- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).\n- CVE-2019-14897: A stack-based buffer overflow was found in the Marvell WiFi driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c. It did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107).\n- CVE-2019-16994: A memory leak existed in sit_init_net() in net/ipv6/sit.c which might have caused denial of service, aka CID-07f12b26e21a (bnc#1161523).\n- CVE-2019-18808: A memory leak in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption), aka CID-128c66429247 (bnc#1156259).\n- CVE-2019-19036: An issue discovered in btrfs_root_node in fs/btrfs/ctree.c allowed a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero (bnc#1157692).\n- CVE-2019-19045: A memory leak in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7 (bnc#1161522).\n- CVE-2019-19051: A memory leak in drivers/net/wimax/i2400m/op-rfkill.c allowed attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7 (bnc#1159024).\n- CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b (bnc#1161518).\n- CVE-2019-19066: A memory leak in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service (memory consumption), aka CID-0e62395da2bd (bnc#1157303).\n- CVE-2019-19318: Mounting a crafted btrfs image twice could have caused a use-after-free (bnc#1158026).\n- CVE-2019-19319: A slab-out-of-bounds write access could have occured when setxattr was called after mounting of a specially crafted ext4 image (bnc#1158021).\n- CVE-2019-19332: An out-of-bounds memory write issue was found in the way the KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could have used this flaw to crash the system (bnc#1158827).\n- CVE-2019-19338: There was an incomplete fix for an issue with Transactional Synchronisation Extensions in the KVM code (bsc#1158954).\n- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting could have led to a use-after-free in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19523: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bsc#1158823).\n- CVE-2019-19526: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098 (bsc#1158893).\n- CVE-2019-19527: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e (bsc#1158900).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that can be caused by a malicious USB HID device, aka CID-d9d4b1e46d95 (bsc#1158824).\n- CVE-2019-19533: There was an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464 (bsc#1158834).\n- CVE-2019-19535: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042 (bsc#1158903).\n- CVE-2019-19537: There was a race condition bug that could be caused by a malicious USB character device, aka CID-303911cfc5b9. (bsc#1158904).\n- CVE-2019-19767: There were multiple use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163 (bnc#1159297).\n- CVE-2019-19927: A slab-out-of-bounds read access could have been caused when mounting a crafted f2fs filesystem image and performing some operations on it, in drivers/gpu/drm/ttm/ttm_page_alloc.c (bnc#1160147).\n- CVE-2019-19965: There was a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5 (bnc#1159911).\n- CVE-2019-19966: There was a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that could have caused a denial of service, aka CID-dea37a972655 (bnc#1159841).\n- CVE-2019-20054: There was a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e (bnc#1159910).\n- CVE-2019-20095: Several memory leaks were found in drivers/net/wireless/marvell/mwifiex/cfg80211.c, aka CID-003b686ace82 (bnc#1159909).\n- CVE-2019-20096: There was a memory leak in __feat_register_sp() in net/dccp/feat.c, aka CID-1d3ff0950e2b (bnc#1159908).\n- CVE-2020-7053: There was a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c (bnc#1160966).\n- CVE-2020-8428: There was a use-after-free bug in fs/namei.c, which allowed local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9 (bnc#1162109).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).\n- CVE-2020-8992: An issue was discovered in ext4_protect_reserved_inode in fs/ext4/block_validity.c that allowed attackers to cause a soft lockup via a crafted journal size (bnc#1164069).\n\n\nThe following non-security bugs were fixed:\n\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- a typo in %kernel_base_conflicts macro name\n- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).\n- ACPI / video: Add force_none quirk for Dell OptiPlex 9020M (bsc#1051510).\n- ACPI / watchdog: Fix init failure with overlapping register regions (bsc#1162557).\n- ACPI / watchdog: Set default timeout in probe (bsc#1162557).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- ACPI: OSL: only free map once in osl.c (bsc#1051510).\n- ACPI: PM: Avoid attaching ACPI PM domain to certain devices (bsc#1051510).\n- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).\n- ACPI: video: Do not export a non working backlight interface on MSI MS-7721 boards (bsc#1051510).\n- ACPI: watchdog: Allow disabling WDAT at boot (bsc#1162557).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).\n- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda - Apply sync-write workaround to old Intel platforms, too (bsc#1111666).\n- ALSA: hda - constify and cleanup static NodeID tables (bsc#1111666).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda - fixup for the bass speaker on Lenovo Carbon X1 7th gen (git-fixes).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda/hdmi - Clean up Intel platform-specific fixup checks (bsc#1111666).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).\n- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).\n- ALSA: hda/realtek - Add Bass Speaker and fixed dac for bass speaker (bsc#1111666).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: hda/realtek - Add Headset Mic supported for HP cPC (bsc#1111666).\n- ALSA: hda/realtek - Add new codec supported for ALCS1200A (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for the bass speaker on Lenovo Yoga X1 7th gen (bsc#1111666).\n- ALSA: hda/realtek - Apply mic mute LED quirk for Dell E7xx laptops, too (bsc#1111666).\n- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).\n- ALSA: hda/realtek - Enable the bass speaker of ASUS UX431FLC (bsc#1111666).\n- ALSA: hda/realtek - Fix inverted bass GPIO pin on Acer 8951G (git-fixes).\n- ALSA: hda/realtek - Fix silent output on MSI-GL73 (git-fixes).\n- ALSA: hda/realtek - Fixed one of HP ALC671 platform Headset Mic supported (bsc#1111666).\n- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).\n- ALSA: hda/realtek - More constifications (bsc#1111666).\n- ALSA: hda/realtek - Set EAPD control to default for ALC222 (bsc#1111666).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: hda: Add JasperLake PCI ID and codec vid (bsc#1111666).\n- ALSA: hda: Clear RIRB status before reading WP (bsc#1111666).\n- ALSA: hda: constify copied structure (bsc#1111666).\n- ALSA: hda: Constify snd_kcontrol_new items (bsc#1111666).\n- ALSA: hda: Constify snd_pci_quirk tables (bsc#1111666).\n- ALSA: hda: correct kernel-doc parameter descriptions (bsc#1111666).\n- ALSA: hda: hdmi - add Tigerlake support (bsc#1111666).\n- ALSA: hda: hdmi - fix pin setup on Tigerlake (bsc#1111666).\n- ALSA: hda: More constifications (bsc#1111666).\n- ALSA: hda: patch_hdmi: remove warnings with empty body (bsc#1111666).\n- ALSA: hda: patch_realtek: fix empty macro usage in if block (bsc#1111666).\n- ALSA: hda: Reset stream if DMA RUN bit not cleared (bsc#1111666).\n- ALSA: hda: Use scnprintf() for printing texts for sysfs/procfs (git-fixes).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).\n- ALSA: seq: Avoid concurrent access to queue flags (git-fixes).\n- ALSA: seq: Fix concurrent access to queue current tick/time (git-fixes).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: sh: Fix unused variable warnings (bsc#1111666).\n- ALSA: usb-audio: Apply sample rate quirk for Audioengine D1 (git-fixes).\n- ALSA: usb-audio: Apply the sample rate quirk for Bose Companion 5 (bsc#1111666).\n- ALSA: usb-audio: Fix endianess in descriptor validation (bsc#1111666).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- apparmor: fix unsigned len comparison with less than zero (git-fixes).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).\n- ASoC: cs4349: Use PM ops \u0027cs4349_runtime_pm\u0027 (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: samsung: i2s: Fix prescaler setting for the secondary DAI (bsc#1111666).\n- ASoC: sun8i-codec: Fix setting DAI data format (git-fixes).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ata: ahci: Add shutdown to freeze hardware resources of ahci (bsc#1164388).\n- ath10k: Correct the DMA direction for management tx buffers (bsc#1111666).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath10k: pci: Fix comment on ath10k_pci_dump_memory_sram (bsc#1111666).\n- ath10k: pci: Only dump ATH10K_MEM_REGION_TYPE_IOREG when safe (bsc#1111666).\n- ath6kl: Fix off by one error in scan completion (bsc#1051510).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).\n- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front() (bsc#1163762).\n- bcache: add code comments for state-\u003epool in __btree_sort() (bsc#1163762).\n- bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n- bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n- bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n- bcache: add more accurate error messages in read_super() (bsc#1163762).\n- bcache: add readahead cache policy options via sysfs interface (bsc#1163762).\n- bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (bsc#1163762).\n- bcache: check return value of prio_read() (bsc#1163762).\n- bcache: deleted code comments for dead code in bch_data_insert_keys() (bsc#1163762).\n- bcache: do not export symbols (bsc#1163762).\n- bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n- bcache: fix a lost wake-up problem caused by mca_cannibalize_lock (bsc#1163762).\n- bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n- bcache: fix deadlock in bcache_allocator (bsc#1163762).\n- bcache: fix incorrect data type usage in btree_flush_write() (bsc#1163762).\n- bcache: fix memory corruption in bch_cache_accounting_clear() (bsc#1163762).\n- bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n- bcache: ignore pending signals when creating gc and allocator thread (bsc#1163762, bsc#1112504).\n- bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n- bcache: reap c-\u003ebtree_cache_freeable from the tail in bch_mca_scan() (bsc#1163762).\n- bcache: reap from tail of c-\u003ebtree_cache in bch_mca_scan() (bsc#1163762).\n- bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n- bcache: remove member accessed from struct btree (bsc#1163762).\n- bcache: remove the extra cflags for request.o (bsc#1163762).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (bsc#1163762, bsc#1112504).\n- bcma: remove set but not used variable \u0027sizel\u0027 (git-fixes).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1159377).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840).\n- blk-mq: make sure that line break can be printed (bsc#1159377).\n- blk-mq: make sure that line break can be printed (bsc#1164098).\n- Bluetooth: Fix race condition in hci_release_sock() (bsc#1051510).\n- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).\n- bnxt: apply computed clamp value for coalece parameter (bsc#1104745).\n- bnxt_en: Fix MSIX request logic for RDMA driver (bsc#1104745 ).\n- bnxt_en: Return error if FW returns more data than dump length (bsc#1104745).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).\n- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- bpf, offload: Unlock on error in bpf_offload_dev_create() (bsc#1109837).\n- bpf/sockmap: Read psock ingress_msg before sk_receive_queue (bsc#1083647).\n- bpf/stackmap: Fix deadlock with rq_lock in bpf_get_stack() (bsc#1083647).\n- bpf: add self-check logic to liveness analysis (bsc#1160618).\n- bpf: add verifier stats and log_level bit 2 (bsc#1160618).\n- bpf: Fix incorrect verifier simulation of ARSH under ALU32 (bsc#1083647).\n- bpf: improve stacksafe state comparison (bco#1160618).\n- bpf: improve verification speed by droping states (bsc#1160618).\n- bpf: improve verification speed by not remarking live_read (bsc#1160618).\n- bpf: improve verifier branch analysis (bsc#1160618).\n- bpf: increase complexity limit and maximum program size (bsc#1160618).\n- bpf: increase verifier log limit (bsc#1160618).\n- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).\n- bpf: Reject indirect var_off stack access in raw mode (bsc#1160618).\n- bpf: Reject indirect var_off stack access in unpriv mode (bco#1160618).\n- bpf: Sanity check max value for var_off stack access (bco#1160618).\n- bpf: skmsg, fix potential psock NULL pointer dereference (bsc#1109837).\n- bpf: speed up stacksafe check (bco#1160618).\n- bpf: Support variable offset stack access from helpers (bco#1160618).\n- bpf: verifier: teach the verifier to reason about the BPF_JSET instruction (bco#1160618).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_p2p_create_p2pdev() (bsc#1111666).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- brcmfmac: sdio: Fix OOB interrupt initialization on brcm43362 (bsc#1111666).\n- brcmfmac: set F2 watermark to 256 for 4373 (bsc#1111666).\n- brcmfmac: set SDIO F1 MesBusyCtrl for CYW4373 (bsc#1111666).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: do not double lock the subvol_sem for rename exchange (bsc#1162943).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- btrfs: fix infinite loop during fsync after rename operations (bsc#1163383).\n- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- btrfs: fix race between adding and putting tree mod seq elements and nodes (bsc#1163384).\n- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1051510).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can: peak_usb: report bus recovery as well (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).\n- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n- cdrom: respect device capabilities during opening action (boo#1164632).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix deadlocks in autodisconnect work (bsc#1111666).\n- cfg80211: fix memory leak in cfg80211_cqm_rssi_update (bsc#1111666).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cgroup: pids: use atomic64_t for pids-\u003elimit (bsc#1161514).\n- chardev: Avoid potential use-after-free in \u0027chrdev_open()\u0027 (bsc#1163849).\n- cifs: add support for flock (bsc#1144333).\n- cifs: Close cached root handle only if it had a lease (bsc#1144333).\n- cifs: Close open handle after interrupted close (bsc#1144333).\n- cifs: close the shared root handle on tree disconnect (bsc#1144333).\n- cifs: Do not miss cancelled OPEN responses (bsc#1144333).\n- cifs: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- cifs: fix mount option display for sec=krb5i (bsc#1161907).\n- cifs: Fix mount options set in automount (bsc#1144333).\n- cifs: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- cifs: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- cifs: Properly process SMB3 lease breaks (bsc#1144333).\n- cifs: remove set but not used variables \u0027cinode\u0027 and \u0027netfid\u0027 (bsc#1144333).\n- cifs: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: imx: clk-composite-8m: add lock to gate/mux (git-fixes).\n- clk: mmp2: Fix the order of timer mux parents (bsc#1051510).\n- clk: qcom: rcg2: Do not crash if our parent can\u0027t be found; return an error (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: sunxi-ng: add mux and pll notifiers for A64 CPU clock (bsc#1051510).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clk: tegra: Mark fuse clock as critical (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource: Prevent double add_timer_on() for watchdog_timer (bsc#1051510).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- configfs_register_group() shouldn\u0027t be (and isn\u0027t) called in rmdirable parts (bsc#1051510).\n- copy/pasted \u0027Recommends:\u0027 instead of \u0027Provides:\u0027, \u0027Obsoletes:\u0027 and \u0027Conflicts:\n- Cover up kABI breakage due to DH key verification (bsc#1155331).\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn-\u003ealg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: caam/qi2 - fix typo in algorithm\u0027s driver name (bsc#1111666).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: dh - add public key verification test (bsc#1155331).\n- crypto: dh - fix calculating encoded key size (bsc#1155331).\n- crypto: dh - fix memory leak (bsc#1155331).\n- crypto: dh - update test for public key verification (bsc#1155331).\n- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n- crypto: ecdh - add public key verification test (bsc#1155331).\n- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- Documentation: Document arm64 kpti control (bsc#1162623).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).\n- drivers/regulator: fix a missing check of return value (bsc#1051510).\n- drm/amd/display: Retrain dongles when SINK_COUNT becomes non-zero (bsc#1111666).\n- drm/amd/powerplay: remove set but not used variable \u0027us_mvdd\u0027 (bsc#1111666).\n- drm/amdgpu/{uvd,vcn}: fetch ring\u0027s read_ptr after alloc (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_device_set_cg_state\u0027 (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)\n- drm/amdgpu: fix ring test failure issue during s3 in vce 3.0 (V2) (bsc#1111666).\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027invalid\u0027 (bsc#1111666).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915/gvt: Pin vgpu dma address before using (bsc#1112178)\n- drm/i915/gvt: set guest display buffer as readonly (bsc#1112178)\n- drm/i915/gvt: use vgpu lock for active state setting (bsc#1112178)\n- drm/i915/perf: add missing delay for OA muxes configuration (bsc#1111666).\n- drm/i915: Add missing include file \u003clinux/math64.h\u003e (bsc#1051510).\n- drm/i915: Call dma_set_max_seg_size() in i915_driver_hw_probe() (bsc#1111666).\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm/i915: Handle vm_mmap error during I915_GEM_MMAP ioctl with WC set (bsc#1111666).\n- drm/i915: Make sure cdclk is high enough for DP audio on VLV/CHV (bsc#1111666).\n- drm/i915: Sanity check mmap length against object size (bsc#1111666).\n- drm/msm: include linux/sched/task.h (bsc#1112178)\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/nouveau/bar/gf100: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/bar/nv50: check bar1 vmm return value (bsc#1111666).\n- drm/nouveau/mmu: qualify vmm during dtor (bsc#1111666).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/rect: Avoid division by zero (bsc#1111666).\n- drm/rect: update kerneldoc for drm_rect_clip_scaled() (bsc#1111666).\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)\n- drm/sun4i: hdmi: Remove duplicate cleanup calls (bsc#1113956)\n- drm/sun4i: tcon: Set min division of TCON0_DCLK to 1 (bsc#1111666).\n- drm/sun4i: tcon: Set RGB DCLK min. divider based on hardware model (bsc#1111666).\n- drm/ttm: ttm_tt_init_fields() can be static (bsc#1111666).\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n- drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable (bsc#1111666).\n- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)\n- e1000e: Add support for Comet Lake (bsc#1158533).\n- e1000e: Add support for Tiger Lake (bsc#1158533).\n- e1000e: Increase pause and refresh time (bsc#1158533).\n- e100: Fix passing zero to \u0027PTR_ERR\u0027 warning in e100_load_ucode_wait (bsc#1051510).\n- Enable CONFIG_BLK_DEV_SR_VENDOR (boo#1164632).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- ext2: check err when partial != NULL (bsc#1163859).\n- ext4, jbd2: ensure panic when aborting with zero errno (bsc#1163853).\n- ext4: check for directory entries too close to block end (bsc#1163861).\n- ext4: fix a bug in ext4_wait_for_tail_page_commit (bsc#1163841).\n- ext4: fix checksum errors with indexed dirs (bsc#1160979).\n- ext4: fix deadlock allocating crypto bounce page from mempool (bsc#1163842).\n- ext4: Fix mount failure with quota configured as module (bsc#1164471).\n- ext4: fix mount failure with quota configured as module (bsc#1164471).\n- ext4: improve explanation of a mount failure caused by a misconfigured kernel (bsc#1163843).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- firestream: fix memory leaks (bsc#1051510).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- Fix partial checked out tree build ... so that bisection does not break.\n- Fix the locking in dcache_readdir() and friends (bsc#1123328).\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/open.c: allow opening only regular files during execve() (bsc#1163845).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- fscrypt: do not set policy for a dead directory (bsc#1163846).\n- ftrace: Add comment to why rcu_dereference_sched() is open coded (git-fixes).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- ftrace: Protect ftrace_graph_hash with ftrace_sync (git-fixes).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- gtp: avoid zero size hashtable (networking-stable-20_01_01).\n- gtp: do not allow adding duplicate tid and ms_addr pdp context (networking-stable-20_01_01).\n- gtp: fix an use-after-free in ipv4_pdp_find() (networking-stable-20_01_01).\n- gtp: fix wrong condition in gtp_genl_dump_pdp() (networking-stable-20_01_01).\n- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- hotplug/drc-info: Add code to search ibm,drc-info property (bsc#1157480 ltc#181028).\n- hv_netvsc: Fix offset usage in netvsc_send_table() (bsc#1164598).\n- hv_netvsc: Fix send_table offset in case of a host bug (bsc#1164598).\n- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1164598).\n- hv_netvsc: Fix unwanted rx_table reset (bsc#1164598).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (k10temp) Add support for AMD family 17h, model 70h CPUs (bsc#1163206).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- hwmon: (pmbus/ltc2978) Fix PMBus polling of MFR_COMMON definitions (bsc#1051510).\n- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- IB/hfi1: Do not cancel unused work item (bsc#1114685 ).\n- IB/mlx5: Fix steering rule of drop and count (bsc#1103991 ).\n- IB/mlx5: Remove dead code (bsc#1103991).\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ice: fix stack leakage (bsc#1118661).\n- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- iommu/amd: Fix IOMMU perf counter clobbering during init (bsc#1162617).\n- iommu/arm-smmu-v3: Populate VMID field for CMDQ_OP_TLBI_NH_VA (bsc#1164314).\n- iommu/io-pgtable-arm: Fix race handling in split_blk_unmap() (bsc#1164115).\n- iommu/iova: Init the struct iova to fix the possible memleak (bsc#1160469).\n- iommu/mediatek: Correct the flush_iotlb_all callback (bsc#1160470).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- ipmi: Do not allow device module unload when in use (bsc#1154768).\n- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: change monitor DMA to be coherent (bsc#1161243).\n- iwlwifi: clear persistence bit according to device family (bsc#1111666).\n- iwlwifi: do not throw error when trying to remove IGTK (bsc#1051510).\n- iwlwifi: mvm: fix NVM check for 3168 devices (bsc#1051510).\n- iwlwifi: mvm: force TCM re-evaluation on TCM resume (bsc#1111666).\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- iwlwifi: pcie: fix erroneous print (bsc#1111666).\n- iwlwifi: trans: Clear persistence bit when starting the FW (bsc#1111666).\n- jbd2: clear JBD2_ABORT flag before journal_reset to update log tail info when load journal (bsc#1163862).\n- jbd2: do not clear the BH_Mapped flag when forgetting a metadata buffer (bsc#1163836).\n- jbd2: Fix possible overflow in jbd2_log_space_left() (bsc#1163860).\n- jbd2: make sure ESHUTDOWN to be recorded in the journal superblock (bsc#1163863).\n- jbd2: move the clearing of b_modified flag to the journal_unmap_buffer() (bsc#1163880).\n- jbd2: switch to use jbd2_journal_abort() when failed to submit the commit record (bsc#1163852).\n- kABI fix for \u0027ipmi: Do not allow device module unload when in use\u0027 (bsc#1154768).\n- kABI fixup for alloc_dax_region (bsc#1158071,bsc#1160678).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kABI/severities: Whitelist rpaphp_get_drc_props (bsc#1157480 ltc#181028).\n- kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n- kABI: protect struct sctp_ep_common (kabi).\n- kABI: Protest new fields in BPF structs (bsc#1160618).\n- kconfig: fix broken dependency in randconfig-generated .config (bsc#1051510).\n- kernel-binary.spec.in: do not recommend firmware for kvmsmall and azure flavor (boo#1161360).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n- kexec: bail out upon SIGKILL when allocating memory (git-fixes).\n- KVM: Clean up __kvm_gfn_to_hva_cache_init() and its callers (bsc#1133021).\n- KVM: PPC: Book3S HV: Uninit vCPU if vcore creation fails (bsc#1061840).\n- KVM: PPC: Book3S PR: Fix -Werror=return-type build failure (bsc#1061840).\n- KVM: PPC: Book3S PR: Free shared page if mmu initialization fails (bsc#1061840).\n- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).\n- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).\n- KVM: SVM: Override default MMIO mask if memory encryption is enabled (bsc#1162618).\n- KVM: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- KVM: x86: Remove a spurious export of a static function (bsc#1158954).\n- lcoking/rwsem: Add missing ACQUIRE to read_slowpath sleep loop (bsc#1050549).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- lib: crc64: include \u003clinux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- libnvdimm/namespace: Differentiate between probe mapping and runtime mapping (bsc#1153535).\n- libnvdimm/pfn: Account for PAGE_SIZE \u003e info-block-size in nd_pfn_init() (bsc#1127682 bsc#1153535 ltc#175033 ltc#181834).\n- libnvdimm: Fix devm_nsio_enable() kabi (bsc#1153535).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- locking/rwsem: Prevent decrement of reader count before increment (bsc#1050549).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- mac80211: fix ieee80211_txq_setup_flows() failure path (bsc#1111666).\n- mac80211: fix station inactive_time shortly after boot (bsc#1051510).\n- mac80211: Fix TKIP replay protection immediately after key setup (bsc#1051510).\n- mac80211: mesh: restrict airtime metric to peered established plinks (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).\n- md/raid0: Fix buffer overflow at debug print (bsc#1164051).\n- media/v4l2-core: set pages dirty upon releasing DMA buffers (bsc#1051510).\n- media: af9005: uninitialized variable printked (bsc#1051510).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: CEC 2.0-only bcast messages were ignored (git-fixes).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: digitv: do not continue if remote control state can\u0027t be read (bsc#1051510).\n- media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0 (bsc#1051510).\n- media: exynos4-is: fix wrong mdev and v4l2 dev order in error path (git-fixes).\n- media: gspca: zero usb_buf (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov6650: Fix control handler not freed on init error (git-fixes).\n- media: ov6650: Fix crop rectangle alignment not passed back (git-fixes).\n- media: ov6650: Fix incorrect use of JPEG colorspace (git-fixes).\n- media: pulse8-cec: fix lost cec_transmit_attempt_done() call.\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media: uvcvideo: Fix error path in control parsing failure (git-fixes).\n- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- mei: bus: prefix device names on bus with the bus name (bsc#1051510).\n- mfd: da9062: Fix watchdog compatible string (bsc#1051510).\n- mfd: dln2: More sanity checking for endpoints (bsc#1051510).\n- mfd: rn5t618: Mark ADC control register volatile (bsc#1051510).\n- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b (\u0027rpm/kernel-subpackage-spec: Unify dependency handling.\u0027) Fixes: 3fd22e219f77 (\u0027rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\u0027)\n- mlxsw: spectrum_qdisc: Ignore grafting of invisible FIFO (bsc#1112374).\n- mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel (bsc#1112374).\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: Revert \u0027mmc: sdhci-of-esdhc: add erratum A-009204 support\u0027 (bsc#1051510).\n- mmc: sdhci: Add a quirk for broken command queuing (git-fixes).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK (git-fixes).\n- mmc: spi: Toggle SPI polarity, do not hardcode it (bsc#1051510).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- moduleparam: fix parameter description mismatch (bsc#1051510).\n- mod_devicetable: fix PHY module format (networking-stable-19_12_28).\n- mqprio: Fix out-of-bounds access in mqprio_dump (bsc#1109837).\n- mtd: fix mtd_oobavail() incoherent returned value (bsc#1051510).\n- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).\n- mwifiex: delete unused mwifiex_get_intf_num() (bsc#1111666).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).\n- mwifiex: update set_mac_address logic (bsc#1111666).\n- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1163851).\n- net, sysctl: Fix compiler warning when only cBPF is present (bsc#1109837).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx4_en: Fix wrong limitation for number of TX rings (bsc#1103989).\n- net/mlx5: Accumulate levels for chains prio namespaces (bsc#1103990).\n- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n- net/mlx5: Update the list of the PCI supported devices (bsc#1127611).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n- net/mlx5e: Query global pause state before setting prio2buffer (bsc#1103990).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net: add sendmsg_locked and sendpage_locked to af_inet6 (bsc#1144162).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n- net: dst: Force 4-byte alignment of dst_metrics (networking-stable-19_12_28).\n- net: ena: fix napi handler misbehavior when the napi budget is zero (networking-stable-20_01_01).\n- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n- net: hisilicon: Fix a BUG trigered by wrong bytes_compl (networking-stable-19_12_28).\n- net: hns3: fix ETS bandwidth validation bug (bsc#1104353 ).\n- net: nfc: nci: fix a possible sleep-in-atomic-context bug in nci_uart_tty_receive() (networking-stable-19_12_28).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).\n- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: Check against net_device being NULL (bsc#1051510).\n- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).\n- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).\n- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).\n- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).\n- net: phy: marvell: clear wol event before setting it (bsc#1051510).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: meson-gxl: check phy_write return value (bsc#1051510).\n- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: mscc: read \u0027vsc8531, edge-slowdown\u0027 as an u32 (bsc#1051510).\n- net: phy: mscc: read \u0027vsc8531,vddmac\u0027 as an u32 (bsc#1051510).\n- net: phy: xgene: disable clk on error paths (bsc#1051510).\n- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).\n- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).\n- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: qlogic: Fix error paths in ql_alloc_large_buffers() (networking-stable-19_12_28).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net: sched: ensure opts_len \u003c= IP_TUNNEL_OPTS_MAX in act_tunnel_key (bsc#1109837).\n- net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues (bsc#1109837).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net: usb: lan78xx: Fix suspend/resume PHY register access error (networking-stable-19_12_28).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- NFC: fdp: fix incorrect free object (networking-stable-19_11_10).\n- NFC: pn533: fix bulk-message timeout (bsc#1051510).\n- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- NFC: st21nfca: fix double free (networking-stable-19_11_10).\n- nvme: fix the parameter order for nvme_get_log in nvme_get_fw_slot_info (bsc#1163774).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- PCI: Add DMA alias quirk for Intel VCA NTB (bsc#1051510).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI: pciehp: Avoid returning prematurely from sysfs requests (git-fixes).\n- PCI: rpaphp: Add drc-info support for hotplug slot registration (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Annotate and correctly byte swap DRC properties (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Avoid a sometimes-uninitialized warning (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Correctly match ibm, my-drc-index to drc-name when using drc-info (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Do not rely on firmware feature to imply drc-info support (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Fix up pointer to first drc-info entry (bsc#1157480 ltc#181028).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1114279).\n- perf/x86/intel: Fix inaccurate period in context switch for auto-reload (bsc#1164315).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctrl: cherryview: Fix irq_valid_mask calculation (bsc#1111666).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).\n- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).\n- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).\n- power: supply: ltc2941-battery-gauge: fix use-after-free (bsc#1051510).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/papr_scm: Do not enable direct map for a region by default (bsc#1129551).\n- powerpc/papr_scm: Fix leaking \u0027bus_desc.provider_name\u0027 in some paths (bsc#1142685 ltc#179509).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/pseries/hotplug-memory: Change rc variable to bool (bsc#1065729).\n- powerpc/pseries/lparcfg: Fix display of Maximum Memory (bsc#1162028 ltc#181740).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/pseries/vio: Fix iommu_table use-after-free refcount warning (bsc#1065729).\n- powerpc/pseries: Add cpu DLPAR support for drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Advance pfn if section is not present in lmb_is_removable() (bsc#1065729).\n- powerpc/pseries: Allow not having ibm, hypertas-functions::hcall-multi-tce for DDW (bsc#1065729).\n- powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init() (git-fixes).\n- powerpc/pseries: Enable support for ibm,drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix bad drc_index_start value parsing of drc-info entry (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix drc-info mappings of logical cpus to drc-index (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix vector5 in ibm architecture vector table (bsc#1157480 ltc#181028).\n- powerpc/pseries: Revert support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: avoid adjusting memory_limit for capture kernel memory reservation (bsc#1140025 ltc#176086).\n- powerpc: Enable support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- powerpc: reserve memory for capture kernel after hugepages init (bsc#1140025 ltc#176086).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- pseries/drc-info: Search DRC properties for CPU indexes (bsc#1157480 ltc#181028).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- pwm: Clear chip_data in pwm_put() (bsc#1051510).\n- pwm: clps711x: Fix period calculation (bsc#1051510).\n- pwm: omap-dmtimer: Remove PWM chip in .remove before making it unfunctional (git-fixes).\n- pwm: Remove set but not set variable \u0027pwm\u0027 (git-fixes).\n- pxa168fb: Fix the function used to release some memory in an error (bsc#1114279)\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qede: Fix multicast mac configuration (networking-stable-19_12_28).\n- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).\n- qmi_wwan: Add support for Quectel RM500Q (bsc#1051510).\n- quota: Check that quota is not dirty before release (bsc#1163858).\n- quota: fix livelock in dquot_writeback_dquots (bsc#1163857).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- r8152: get default setting of WOL before initializing (bsc#1051510).\n- random: move FIPS continuous test to output functions (bsc#1155334).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- RDMA/bnxt_re: Enable SRIOV VF support on Broadcom\u0027s 57500 adapter series (bsc#1154916).\n- RDMA/bnxt_re: Fix chip number validation Broadcom\u0027s Gen P5 series (bsc#1157895).\n- RDMA/bnxt_re: Fix missing le16_to_cpu (bsc#1157895).\n- RDMA/hns: Bugfix for qpc/cqc timer configuration (bsc#1104427 bsc#1126206).\n- RDMA/hns: Correct the value of srq_desc_size (bsc#1104427 ).\n- RDMA/hns: Fix to support 64K page for srq (bsc#1104427 ).\n- RDMA/hns: Prevent memory leaks of eq-\u003ebuf_list (bsc#1104427 ).\n- README.BRANCH: Update the branch name to cve/linux-4.12\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- regulator: tps65910: fix a missing check of return value (bsc#1051510).\n- reiserfs: Fix memory leak of journal device string (bsc#1163867).\n- reiserfs: Fix spurious unlock in reiserfs_fill_super() error handling (bsc#1163869).\n- reset: fix reset_control_ops kerneldoc comment (bsc#1051510).\n- resource: fix locking in find_next_iomem_res() (bsc#1114279).\n- Revert \u0027locking/pvqspinlock: Do not wait if vCPU is preempted\u0027 (bsc#1050549).\n- rpm/kabi.pl: support new (\u003e=5.4) Module.symvers format (new symbol namespace field)\n- rpm/kernel-binary.spec.in: Conflict with too old powerpc-utils (jsc#ECO-920, jsc#SLE-11054, jsc#SLE-11322).\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages\n- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n- rpm/kernel-subpackage-spec: fix kernel-default-base build There were some issues with recent changes to subpackage dependencies handling:\n- rpm/kernel-subpackage-spec: Unify dependency handling.\n- rpm/modules.fips: update module list (bsc#1157853)\n- rsi_91x_usb: fix interface sanity check (git-fixes).\n- rtc: cmos: Stop using shared IRQ (bsc#1051510).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: hym8563: Return -EINVAL if the time is known to be invalid (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in \u0027max8997_rtc_read_alarm()\u0027 (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf\u0027s type to u8 in s35390a_init (bsc#1051510).\n- rtl818x: fix potential use after free (bsc#1051510).\n- rtl8xxxu: fix interface sanity check (git-fixes).\n- rtlwifi: Fix MAX MPDU of VHT capability (git-fixes).\n- rtlwifi: Remove redundant semicolon in wifi.h (git-fixes).\n- rtlwifi: rtl8192de: Fix missing callback that tests for hw release of buffer (bsc#1111666).\n- s390/qeth: clean up page frag creation (git-fixes).\n- s390/qeth: consolidate skb allocation (git-fixes).\n- s390/qeth: ensure linear access to packet headers (git-fixes).\n- s390/qeth: guard against runt packets (git-fixes).\n- sched/fair: Add tmp_alone_branch assertion (bnc#1156462).\n- sched/fair: Fix insertion in rq-\u003eleaf_cfs_rq_list (bnc#1156462).\n- sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).\n- sched/fair: Optimize update_blocked_averages() (bnc#1156462).\n- sched/fair: WARN() and refuse to set buddy when !se-\u003eon_rq (bsc#1158132).\n- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1154601).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Correctly retrieve and interpret active flash region (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix a NULL pointer dereference in an error path (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix unbound NVME response length (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- scsi: zfcp: trace channel log even for FCP command responses (git-fixes).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- sctp: fully initialize v4 addr in some functions (networking-stable-19_12_28).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: max310x: Fix tx_empty() callback (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- sfc: Remove \u0027PCIE error reporting unavailable\u0027 (bsc#1161472).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- smb3: Fix persistent handles reconnect (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: remove confusing dmesg when mounting with encryption (\u0027seal\u0027) (bsc#1144333).\n- soc/tegra: fuse: Correct straps\u0027 address for older Tegra124 device trees (bsc#1051510).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- soc: ti: wkup_m3_ipc: Fix race condition with rproc_boot (bsc#1051510).\n- spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch (bsc#1051510).\n- spi: omap2-mcspi: Set FIFO DMA trigger level to word length (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- sr_vendor: support Beurer GL50 evo CD-on-a-chip devices (boo#1164632).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- Staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: rtl8192e: fix potential use after free (bsc#1051510).\n- staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids (bsc#1051510).\n- staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).\n- staging: vt6656: correct packet types for CTS protect, mode (bsc#1051510).\n- staging: vt6656: Fix false Tx excessive retries reporting (bsc#1051510).\n- staging: vt6656: use NULLFUCTION stack on mac80211 (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- stm class: Fix a double free of stm_source_device (bsc#1051510).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810, bsc#1161702).\n- stop_machine: Atomically queue and wake stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption after queueing stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption when waking two stopper threads (bsc#1088810, bsc#1161702).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1160560).\n- tcp: do not send empty skb from tcp_write_xmit() (networking-stable-20_01_01).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).\n- tipc: fix a missing check of genlmsg_put (bsc#1051510).\n- tipc: fix link name length check (bsc#1051510).\n- tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).\n- tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).\n- tracing: Annotate ftrace_graph_hash pointer with __rcu (git-fixes).\n- tracing: Annotate ftrace_graph_notrace_hash pointer with __rcu (git-fixes).\n- tracing: Fix tracing_stat return values in error handling paths (git-fixes).\n- tracing: Fix very unlikely race of registering two stat tracers (git-fixes).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- uaccess: Add non-pagefault user-space write function (bsc#1083647).\n- ubifs: do not trigger assertion on invalid no-key filename (bsc#1163850).\n- ubifs: Fix deadlock in concurrent bulk-read and writepage (bsc#1163856).\n- ubifs: Fix FS_IOC_SETFLAGS unexpectedly clearing encrypt flag (bsc#1163855).\n- ubifs: Reject unsupported ioctl flags explicitly (bsc#1163844).\n- udp: fix integer overflow while computing available space in sk_rcvbuf (networking-stable-20_01_01).\n- usb-storage: Disable UAS on JMicron SATA enclosure (bsc#1051510).\n- usb: adutux: fix interface sanity check (bsc#1051510).\n- usb: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- usb: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- usb: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- usb: core: fix check for duplicate endpoints (git-fixes).\n- usb: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- usb: core: urb: fix URB structure initialization function (bsc#1051510).\n- usb: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- usb: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- usb: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- usb: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- usb: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- usb: EHCI: Do not return -EPIPE when hub is disconnected (git-fixes).\n- usb: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).\n- usb: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- usb: gadget: legacy: set max_speed to super-speed (bsc#1051510).\n- usb: gadget: pch_udc: fix use after free (bsc#1051510).\n- usb: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- usb: gadget: Zero ffs_io_data (bsc#1051510).\n- usb: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- usb: idmouse: fix interface sanity checks (bsc#1051510).\n- usb: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n- usb: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- usb: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- usb: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- usb: roles: fix a potential use after free (git-fixes).\n- usb: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).\n- usb: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- usb: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n- usb: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- usb: serial: io_edgeport: use irqsave() in USB\u0027s complete callback (bsc#1051510).\n- usb: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- usb: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- usb: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- usb: serial: keyspan: handle unbound ports (bsc#1051510).\n- usb: serial: opticon: fix control-message timeouts (bsc#1051510).\n- usb: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- usb: serial: option: add support for Quectel RM500Q in QDL mode (git-fixes).\n- usb: serial: option: add Telit ME910G1 0x110a composition (git-fixes).\n- usb: serial: option: add ZLP support for 0x1bc7/0x9010 (git-fixes).\n- usb: serial: quatech2: handle unbound ports (bsc#1051510).\n- usb: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- usb: serial: suppress driver bind attributes (bsc#1051510).\n- usb: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- usb: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- usb: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- usb: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- usb: xhci: only set D3hot for pci device (bsc#1051510).\n- usbip: Fix error path of vhci_recv_ret_submit() (git-fixes).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1 (bsc#1051510).\n- vhost/vsock: accept only packets with the right dst_cid (networking-stable-20_01_01).\n- video: backlight: Add devres versions of of_find_backlight (bsc#1090888) Taken for 6010831dde5.\n- video: backlight: Add of_find_backlight helper in backlight.c (bsc#1090888) Taken for 6010831dde5.\n- watchdog: max77620_wdt: fix potential build errors (bsc#1051510).\n- watchdog: rn5t618_wdt: fix module aliases (bsc#1051510).\n- watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).\n- watchdog: wdat_wdt: fix get_timeleft call for wdat_wdt (bsc#1162557).\n- wireless: fix enabling channel 12 for custom regulatory domain (bsc#1051510).\n- wireless: wext: avoid gcc -O3 warning (bsc#1051510).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 70h (bsc#1163206).\n- x86/cpu: Update cached HLE state on write to TSX_CTRL_CPUID_CLEAR (bsc#1162619).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/resctrl: Check monitoring static key in the MBM overflow handler (bsc#1114279).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free when deleting resource groups (bsc#1114279).\n- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xen/balloon: Support xend-based toolstack take two (bsc#1065600).\n- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xen: Enable interrupts when calling _cond_resched() (bsc#1065600).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-511,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-511",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0511-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:0511-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200511-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:0511-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1046303",
        "url": "https://bugzilla.suse.com/1046303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050244",
        "url": "https://bugzilla.suse.com/1050244"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050549",
        "url": "https://bugzilla.suse.com/1050549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051858",
        "url": "https://bugzilla.suse.com/1051858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061840",
        "url": "https://bugzilla.suse.com/1061840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1083647",
        "url": "https://bugzilla.suse.com/1083647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085030",
        "url": "https://bugzilla.suse.com/1085030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086301",
        "url": "https://bugzilla.suse.com/1086301"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086313",
        "url": "https://bugzilla.suse.com/1086313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086314",
        "url": "https://bugzilla.suse.com/1086314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088810",
        "url": "https://bugzilla.suse.com/1088810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1090888",
        "url": "https://bugzilla.suse.com/1090888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103989",
        "url": "https://bugzilla.suse.com/1103989"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103990",
        "url": "https://bugzilla.suse.com/1103990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103991",
        "url": "https://bugzilla.suse.com/1103991"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104353",
        "url": "https://bugzilla.suse.com/1104353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104427",
        "url": "https://bugzilla.suse.com/1104427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104745",
        "url": "https://bugzilla.suse.com/1104745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1105392",
        "url": "https://bugzilla.suse.com/1105392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1109837",
        "url": "https://bugzilla.suse.com/1109837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111666",
        "url": "https://bugzilla.suse.com/1111666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112374",
        "url": "https://bugzilla.suse.com/1112374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112504",
        "url": "https://bugzilla.suse.com/1112504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113956",
        "url": "https://bugzilla.suse.com/1113956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114685",
        "url": "https://bugzilla.suse.com/1114685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1115026",
        "url": "https://bugzilla.suse.com/1115026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118338",
        "url": "https://bugzilla.suse.com/1118338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118661",
        "url": "https://bugzilla.suse.com/1118661"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1123328",
        "url": "https://bugzilla.suse.com/1123328"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126206",
        "url": "https://bugzilla.suse.com/1126206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127371",
        "url": "https://bugzilla.suse.com/1127371"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127611",
        "url": "https://bugzilla.suse.com/1127611"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127682",
        "url": "https://bugzilla.suse.com/1127682"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129551",
        "url": "https://bugzilla.suse.com/1129551"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133147",
        "url": "https://bugzilla.suse.com/1133147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1134973",
        "url": "https://bugzilla.suse.com/1134973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1140025",
        "url": "https://bugzilla.suse.com/1140025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1142685",
        "url": "https://bugzilla.suse.com/1142685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1143959",
        "url": "https://bugzilla.suse.com/1143959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144162",
        "url": "https://bugzilla.suse.com/1144162"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144333",
        "url": "https://bugzilla.suse.com/1144333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151548",
        "url": "https://bugzilla.suse.com/1151548"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151910",
        "url": "https://bugzilla.suse.com/1151910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151927",
        "url": "https://bugzilla.suse.com/1151927"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152107",
        "url": "https://bugzilla.suse.com/1152107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152631",
        "url": "https://bugzilla.suse.com/1152631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153535",
        "url": "https://bugzilla.suse.com/1153535"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153917",
        "url": "https://bugzilla.suse.com/1153917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154243",
        "url": "https://bugzilla.suse.com/1154243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154601",
        "url": "https://bugzilla.suse.com/1154601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154768",
        "url": "https://bugzilla.suse.com/1154768"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154916",
        "url": "https://bugzilla.suse.com/1154916"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155331",
        "url": "https://bugzilla.suse.com/1155331"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155334",
        "url": "https://bugzilla.suse.com/1155334"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155689",
        "url": "https://bugzilla.suse.com/1155689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156259",
        "url": "https://bugzilla.suse.com/1156259"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156286",
        "url": "https://bugzilla.suse.com/1156286"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156462",
        "url": "https://bugzilla.suse.com/1156462"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157155",
        "url": "https://bugzilla.suse.com/1157155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157157",
        "url": "https://bugzilla.suse.com/1157157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157169",
        "url": "https://bugzilla.suse.com/1157169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157303",
        "url": "https://bugzilla.suse.com/1157303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157424",
        "url": "https://bugzilla.suse.com/1157424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157480",
        "url": "https://bugzilla.suse.com/1157480"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157692",
        "url": "https://bugzilla.suse.com/1157692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157853",
        "url": "https://bugzilla.suse.com/1157853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157895",
        "url": "https://bugzilla.suse.com/1157895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157908",
        "url": "https://bugzilla.suse.com/1157908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157966",
        "url": "https://bugzilla.suse.com/1157966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158013",
        "url": "https://bugzilla.suse.com/1158013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158021",
        "url": "https://bugzilla.suse.com/1158021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158026",
        "url": "https://bugzilla.suse.com/1158026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158071",
        "url": "https://bugzilla.suse.com/1158071"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158094",
        "url": "https://bugzilla.suse.com/1158094"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158132",
        "url": "https://bugzilla.suse.com/1158132"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158381",
        "url": "https://bugzilla.suse.com/1158381"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158533",
        "url": "https://bugzilla.suse.com/1158533"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158819",
        "url": "https://bugzilla.suse.com/1158819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158823",
        "url": "https://bugzilla.suse.com/1158823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158824",
        "url": "https://bugzilla.suse.com/1158824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158827",
        "url": "https://bugzilla.suse.com/1158827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158834",
        "url": "https://bugzilla.suse.com/1158834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158893",
        "url": "https://bugzilla.suse.com/1158893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158900",
        "url": "https://bugzilla.suse.com/1158900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158903",
        "url": "https://bugzilla.suse.com/1158903"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158904",
        "url": "https://bugzilla.suse.com/1158904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158954",
        "url": "https://bugzilla.suse.com/1158954"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159024",
        "url": "https://bugzilla.suse.com/1159024"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159028",
        "url": "https://bugzilla.suse.com/1159028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159271",
        "url": "https://bugzilla.suse.com/1159271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159297",
        "url": "https://bugzilla.suse.com/1159297"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159377",
        "url": "https://bugzilla.suse.com/1159377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159394",
        "url": "https://bugzilla.suse.com/1159394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159483",
        "url": "https://bugzilla.suse.com/1159483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159484",
        "url": "https://bugzilla.suse.com/1159484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159500",
        "url": "https://bugzilla.suse.com/1159500"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159569",
        "url": "https://bugzilla.suse.com/1159569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159588",
        "url": "https://bugzilla.suse.com/1159588"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159841",
        "url": "https://bugzilla.suse.com/1159841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159908",
        "url": "https://bugzilla.suse.com/1159908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159909",
        "url": "https://bugzilla.suse.com/1159909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159910",
        "url": "https://bugzilla.suse.com/1159910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159911",
        "url": "https://bugzilla.suse.com/1159911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159955",
        "url": "https://bugzilla.suse.com/1159955"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160147",
        "url": "https://bugzilla.suse.com/1160147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160195",
        "url": "https://bugzilla.suse.com/1160195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160210",
        "url": "https://bugzilla.suse.com/1160210"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160211",
        "url": "https://bugzilla.suse.com/1160211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160218",
        "url": "https://bugzilla.suse.com/1160218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160433",
        "url": "https://bugzilla.suse.com/1160433"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160442",
        "url": "https://bugzilla.suse.com/1160442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160469",
        "url": "https://bugzilla.suse.com/1160469"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160470",
        "url": "https://bugzilla.suse.com/1160470"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160476",
        "url": "https://bugzilla.suse.com/1160476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160560",
        "url": "https://bugzilla.suse.com/1160560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160618",
        "url": "https://bugzilla.suse.com/1160618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160678",
        "url": "https://bugzilla.suse.com/1160678"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160755",
        "url": "https://bugzilla.suse.com/1160755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160756",
        "url": "https://bugzilla.suse.com/1160756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160784",
        "url": "https://bugzilla.suse.com/1160784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160787",
        "url": "https://bugzilla.suse.com/1160787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160802",
        "url": "https://bugzilla.suse.com/1160802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160803",
        "url": "https://bugzilla.suse.com/1160803"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160804",
        "url": "https://bugzilla.suse.com/1160804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160917",
        "url": "https://bugzilla.suse.com/1160917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160966",
        "url": "https://bugzilla.suse.com/1160966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160979",
        "url": "https://bugzilla.suse.com/1160979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161087",
        "url": "https://bugzilla.suse.com/1161087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161243",
        "url": "https://bugzilla.suse.com/1161243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161360",
        "url": "https://bugzilla.suse.com/1161360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161472",
        "url": "https://bugzilla.suse.com/1161472"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161514",
        "url": "https://bugzilla.suse.com/1161514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161518",
        "url": "https://bugzilla.suse.com/1161518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161522",
        "url": "https://bugzilla.suse.com/1161522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161523",
        "url": "https://bugzilla.suse.com/1161523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161549",
        "url": "https://bugzilla.suse.com/1161549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161552",
        "url": "https://bugzilla.suse.com/1161552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161674",
        "url": "https://bugzilla.suse.com/1161674"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161702",
        "url": "https://bugzilla.suse.com/1161702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161907",
        "url": "https://bugzilla.suse.com/1161907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161931",
        "url": "https://bugzilla.suse.com/1161931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161933",
        "url": "https://bugzilla.suse.com/1161933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161934",
        "url": "https://bugzilla.suse.com/1161934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161935",
        "url": "https://bugzilla.suse.com/1161935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161936",
        "url": "https://bugzilla.suse.com/1161936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161937",
        "url": "https://bugzilla.suse.com/1161937"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162028",
        "url": "https://bugzilla.suse.com/1162028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162067",
        "url": "https://bugzilla.suse.com/1162067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162109",
        "url": "https://bugzilla.suse.com/1162109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162139",
        "url": "https://bugzilla.suse.com/1162139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162557",
        "url": "https://bugzilla.suse.com/1162557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162617",
        "url": "https://bugzilla.suse.com/1162617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162618",
        "url": "https://bugzilla.suse.com/1162618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162619",
        "url": "https://bugzilla.suse.com/1162619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162623",
        "url": "https://bugzilla.suse.com/1162623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162943",
        "url": "https://bugzilla.suse.com/1162943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163206",
        "url": "https://bugzilla.suse.com/1163206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163383",
        "url": "https://bugzilla.suse.com/1163383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163384",
        "url": "https://bugzilla.suse.com/1163384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163762",
        "url": "https://bugzilla.suse.com/1163762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163774",
        "url": "https://bugzilla.suse.com/1163774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163836",
        "url": "https://bugzilla.suse.com/1163836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163840",
        "url": "https://bugzilla.suse.com/1163840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163841",
        "url": "https://bugzilla.suse.com/1163841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163842",
        "url": "https://bugzilla.suse.com/1163842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163843",
        "url": "https://bugzilla.suse.com/1163843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163844",
        "url": "https://bugzilla.suse.com/1163844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163845",
        "url": "https://bugzilla.suse.com/1163845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163846",
        "url": "https://bugzilla.suse.com/1163846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163849",
        "url": "https://bugzilla.suse.com/1163849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163850",
        "url": "https://bugzilla.suse.com/1163850"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163851",
        "url": "https://bugzilla.suse.com/1163851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163852",
        "url": "https://bugzilla.suse.com/1163852"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163853",
        "url": "https://bugzilla.suse.com/1163853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163855",
        "url": "https://bugzilla.suse.com/1163855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163856",
        "url": "https://bugzilla.suse.com/1163856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163857",
        "url": "https://bugzilla.suse.com/1163857"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163858",
        "url": "https://bugzilla.suse.com/1163858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163859",
        "url": "https://bugzilla.suse.com/1163859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163860",
        "url": "https://bugzilla.suse.com/1163860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163861",
        "url": "https://bugzilla.suse.com/1163861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163862",
        "url": "https://bugzilla.suse.com/1163862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163863",
        "url": "https://bugzilla.suse.com/1163863"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163867",
        "url": "https://bugzilla.suse.com/1163867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163869",
        "url": "https://bugzilla.suse.com/1163869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163880",
        "url": "https://bugzilla.suse.com/1163880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164051",
        "url": "https://bugzilla.suse.com/1164051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164069",
        "url": "https://bugzilla.suse.com/1164069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164098",
        "url": "https://bugzilla.suse.com/1164098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164115",
        "url": "https://bugzilla.suse.com/1164115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164314",
        "url": "https://bugzilla.suse.com/1164314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164315",
        "url": "https://bugzilla.suse.com/1164315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164388",
        "url": "https://bugzilla.suse.com/1164388"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164471",
        "url": "https://bugzilla.suse.com/1164471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164598",
        "url": "https://bugzilla.suse.com/1164598"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164632",
        "url": "https://bugzilla.suse.com/1164632"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14615 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14897 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16746 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16746/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16994 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16994/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18808 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19036 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19045 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19051 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19066 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19318 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19318/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19319 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19319/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19332 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19332/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19338 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19338/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19447 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19447/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19523 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19523/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19526 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19526/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19527 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19527/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19532 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19532/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19533 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19533/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19535 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19535/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19537 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19537/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19767 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19927 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19927/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19965 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19966 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20095 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20096 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-7053 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-7053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8428 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8428/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-02-27T12:07:39Z",
      "generator": {
        "date": "2020-02-27T12:07:39Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:0511-1",
      "initial_release_date": "2020-02-27T12:07:39Z",
      "revision_history": [
        {
          "date": "2020-02-27T12:07:39Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-4.12.14-8.27.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-4.12.14-8.27.1.noarch",
                  "product_id": "kernel-devel-azure-4.12.14-8.27.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-4.12.14-8.27.1.noarch",
                "product": {
                  "name": "kernel-source-azure-4.12.14-8.27.1.noarch",
                  "product_id": "kernel-source-azure-4.12.14-8.27.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-4.12.14-8.27.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-4.12.14-8.27.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-4.12.14-8.27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-4.12.14-8.27.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-4.12.14-8.27.1.x86_64",
                  "product_id": "dlm-kmp-azure-4.12.14-8.27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-4.12.14-8.27.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-4.12.14-8.27.1.x86_64",
                  "product_id": "gfs2-kmp-azure-4.12.14-8.27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-4.12.14-8.27.1.x86_64",
                "product": {
                  "name": "kernel-azure-4.12.14-8.27.1.x86_64",
                  "product_id": "kernel-azure-4.12.14-8.27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-base-4.12.14-8.27.1.x86_64",
                "product": {
                  "name": "kernel-azure-base-4.12.14-8.27.1.x86_64",
                  "product_id": "kernel-azure-base-4.12.14-8.27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-4.12.14-8.27.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-4.12.14-8.27.1.x86_64",
                  "product_id": "kernel-azure-devel-4.12.14-8.27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-4.12.14-8.27.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-4.12.14-8.27.1.x86_64",
                  "product_id": "kernel-azure-extra-4.12.14-8.27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-4.12.14-8.27.1.x86_64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-4.12.14-8.27.1.x86_64",
                  "product_id": "kernel-azure-livepatch-devel-4.12.14-8.27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-4.12.14-8.27.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-4.12.14-8.27.1.x86_64",
                  "product_id": "kernel-syms-azure-4.12.14-8.27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-4.12.14-8.27.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-4.12.14-8.27.1.x86_64",
                  "product_id": "kselftests-kmp-azure-4.12.14-8.27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-4.12.14-8.27.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-4.12.14-8.27.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-4.12.14-8.27.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-4.12.14-8.27.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-azure-4.12.14-8.27.1.x86_64",
                  "product_id": "reiserfs-kmp-azure-4.12.14-8.27.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-4.12.14-8.27.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64"
        },
        "product_reference": "kernel-azure-4.12.14-8.27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-base-4.12.14-8.27.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64"
        },
        "product_reference": "kernel-azure-base-4.12.14-8.27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-4.12.14-8.27.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-4.12.14-8.27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-4.12.14-8.27.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch"
        },
        "product_reference": "kernel-devel-azure-4.12.14-8.27.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-4.12.14-8.27.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch"
        },
        "product_reference": "kernel-source-azure-4.12.14-8.27.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-4.12.14-8.27.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-4.12.14-8.27.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-14615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14615",
          "url": "https://www.suse.com/security/cve/CVE-2019-14615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160195 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1160195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165881 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1165881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14615"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-14897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14897",
          "url": "https://www.suse.com/security/cve/CVE-2019-14897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157155 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1157155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160467 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14897"
    },
    {
      "cve": "CVE-2019-16746",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16746"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16746",
          "url": "https://www.suse.com/security/cve/CVE-2019-16746"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1152107 for CVE-2019-16746",
          "url": "https://bugzilla.suse.com/1152107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173659 for CVE-2019-16746",
          "url": "https://bugzilla.suse.com/1173659"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-16746"
    },
    {
      "cve": "CVE-2019-16994",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16994"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16994",
          "url": "https://www.suse.com/security/cve/CVE-2019-16994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161523 for CVE-2019-16994",
          "url": "https://bugzilla.suse.com/1161523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16994"
    },
    {
      "cve": "CVE-2019-18808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18808",
          "url": "https://www.suse.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156259 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1156259"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18808"
    },
    {
      "cve": "CVE-2019-19036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19036",
          "url": "https://www.suse.com/security/cve/CVE-2019-19036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157692 for CVE-2019-19036",
          "url": "https://bugzilla.suse.com/1157692"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19036"
    },
    {
      "cve": "CVE-2019-19045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19045",
          "url": "https://www.suse.com/security/cve/CVE-2019-19045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161522 for CVE-2019-19045",
          "url": "https://bugzilla.suse.com/1161522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19045"
    },
    {
      "cve": "CVE-2019-19051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19051",
          "url": "https://www.suse.com/security/cve/CVE-2019-19051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159024 for CVE-2019-19051",
          "url": "https://bugzilla.suse.com/1159024"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19051"
    },
    {
      "cve": "CVE-2019-19054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19054",
          "url": "https://www.suse.com/security/cve/CVE-2019-19054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161518 for CVE-2019-19054",
          "url": "https://bugzilla.suse.com/1161518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19054"
    },
    {
      "cve": "CVE-2019-19066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19066",
          "url": "https://www.suse.com/security/cve/CVE-2019-19066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157303 for CVE-2019-19066",
          "url": "https://bugzilla.suse.com/1157303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19066"
    },
    {
      "cve": "CVE-2019-19318",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19318"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19318",
          "url": "https://www.suse.com/security/cve/CVE-2019-19318"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158026 for CVE-2019-19318",
          "url": "https://bugzilla.suse.com/1158026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19318"
    },
    {
      "cve": "CVE-2019-19319",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19319"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19319",
          "url": "https://www.suse.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158021 for CVE-2019-19319",
          "url": "https://bugzilla.suse.com/1158021"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19319"
    },
    {
      "cve": "CVE-2019-19332",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19332"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19332",
          "url": "https://www.suse.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158827 for CVE-2019-19332",
          "url": "https://bugzilla.suse.com/1158827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19332"
    },
    {
      "cve": "CVE-2019-19338",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19338"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19338",
          "url": "https://www.suse.com/security/cve/CVE-2019-19338"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158954 for CVE-2019-19338",
          "url": "https://bugzilla.suse.com/1158954"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19338"
    },
    {
      "cve": "CVE-2019-19447",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19447"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19447",
          "url": "https://www.suse.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158819 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1158819"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173869 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1173869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-19447"
    },
    {
      "cve": "CVE-2019-19523",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19523"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19523",
          "url": "https://www.suse.com/security/cve/CVE-2019-19523"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158823 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19523"
    },
    {
      "cve": "CVE-2019-19526",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19526"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19526",
          "url": "https://www.suse.com/security/cve/CVE-2019-19526"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19526",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19526",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158893 for CVE-2019-19526",
          "url": "https://bugzilla.suse.com/1158893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19526"
    },
    {
      "cve": "CVE-2019-19527",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19527"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19527",
          "url": "https://www.suse.com/security/cve/CVE-2019-19527"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158900 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19527"
    },
    {
      "cve": "CVE-2019-19532",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19532"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19532",
          "url": "https://www.suse.com/security/cve/CVE-2019-19532"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158823 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158824 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19532"
    },
    {
      "cve": "CVE-2019-19533",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19533"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19533",
          "url": "https://www.suse.com/security/cve/CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19533",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19533",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19533"
    },
    {
      "cve": "CVE-2019-19535",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19535"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19535",
          "url": "https://www.suse.com/security/cve/CVE-2019-19535"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158903 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19535"
    },
    {
      "cve": "CVE-2019-19537",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19537"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19537",
          "url": "https://www.suse.com/security/cve/CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158904 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158904"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19537"
    },
    {
      "cve": "CVE-2019-19767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19767",
          "url": "https://www.suse.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159297 for CVE-2019-19767",
          "url": "https://bugzilla.suse.com/1159297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19767"
    },
    {
      "cve": "CVE-2019-19927",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19927"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19927",
          "url": "https://www.suse.com/security/cve/CVE-2019-19927"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160147 for CVE-2019-19927",
          "url": "https://bugzilla.suse.com/1160147"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19927"
    },
    {
      "cve": "CVE-2019-19965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19965",
          "url": "https://www.suse.com/security/cve/CVE-2019-19965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159911 for CVE-2019-19965",
          "url": "https://bugzilla.suse.com/1159911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19965"
    },
    {
      "cve": "CVE-2019-19966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19966",
          "url": "https://www.suse.com/security/cve/CVE-2019-19966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159841 for CVE-2019-19966",
          "url": "https://bugzilla.suse.com/1159841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19966"
    },
    {
      "cve": "CVE-2019-20054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20054",
          "url": "https://www.suse.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159910 for CVE-2019-20054",
          "url": "https://bugzilla.suse.com/1159910"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20054"
    },
    {
      "cve": "CVE-2019-20095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20095",
          "url": "https://www.suse.com/security/cve/CVE-2019-20095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159909 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159914 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-20095"
    },
    {
      "cve": "CVE-2019-20096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20096",
          "url": "https://www.suse.com/security/cve/CVE-2019-20096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159908 for CVE-2019-20096",
          "url": "https://bugzilla.suse.com/1159908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20096"
    },
    {
      "cve": "CVE-2020-7053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-7053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-7053",
          "url": "https://www.suse.com/security/cve/CVE-2020-7053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160966 for CVE-2020-7053",
          "url": "https://bugzilla.suse.com/1160966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-7053"
    },
    {
      "cve": "CVE-2020-8428",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8428"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8428",
          "url": "https://www.suse.com/security/cve/CVE-2020-8428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162109 for CVE-2020-8428",
          "url": "https://bugzilla.suse.com/1162109"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8428"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.27.1.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.27.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.27.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-02-27T12:07:39Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    }
  ]
}
  suse-su-2020:0667-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 12-SP5 kernel-RT was updated to 4.12.14 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-8992: Fixed an issue in ext4_protect_reserved_inode in fs/ext4/block_validity.c that allowed attackers to cause a soft lockup via a crafted journal size (bsc#1164069).\n- CVE-2020-8648: Fixed a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).\n- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).\n- CVE-2019-16746: There was an issue in net/wireless/nl80211.c where the kernel did not check the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).\n- CVE-2020-8428: There was a use-after-free bug in fs/namei.c, which allowed local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9 (bsc#1162109).\n- CVE-2019-14895: Fixed a heap-based buffer overflow in Marvell WiFi chip driver which could have led to denial of service or possibly execute arbitrary code (bsc#1157042).\n\nThe following non-security bugs were fixed:\n\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- ACPI: PM: Avoid attaching ACPI PM domain to certain devices (bsc#1051510).\n- ACPI / video: Add force_none quirk for Dell OptiPlex 9020M (bsc#1051510).\n- ACPI: video: Do not export a non working backlight interface on MSI MS-7721 boards (bsc#1051510).\n- ACPI: watchdog: Allow disabling WDAT at boot (bsc#1162557).\n- ACPI / watchdog: Fix init failure with overlapping register regions (bsc#1162557).\n- ACPI / watchdog: Set default timeout in probe (bsc#1162557).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda: Add JasperLake PCI ID and codec vid (bsc#1111666).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda: Clear RIRB status before reading WP (bsc#1111666).\n- ALSA: hda - constify and cleanup static NodeID tables (bsc#1111666).\n- ALSA: hda: constify copied structure (bsc#1111666).\n- ALSA: hda: Constify snd_kcontrol_new items (bsc#1111666).\n- ALSA: hda: Constify snd_pci_quirk tables (bsc#1111666).\n- ALSA: hda: correct kernel-doc parameter descriptions (bsc#1111666).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda: hdmi - add Tigerlake support (bsc#1111666).\n- ALSA: hda/hdmi - Clean up Intel platform-specific fixup checks (bsc#1111666).\n- ALSA: hda: hdmi - fix pin setup on Tigerlake (bsc#1111666).\n- ALSA: hda: More constifications (bsc#1111666).\n- ALSA: hda: patch_hdmi: remove warnings with empty body (bsc#1111666).\n- ALSA: hda: patch_realtek: fix empty macro usage in if block (bsc#1111666).\n- ALSA: hda/realtek - Add Headset Mic supported for HP cPC (bsc#1111666).\n- ALSA: hda/realtek - Apply mic mute LED quirk for Dell E7xx laptops, too (bsc#1111666).\n- ALSA: hda/realtek - Fixed one of HP ALC671 platform Headset Mic supported (bsc#1111666).\n- ALSA: hda/realtek - Fix silent output on MSI-GL73 (git-fixes).\n- ALSA: hda/realtek - More constifications (bsc#1111666).\n- ALSA: hda: Reset stream if DMA RUN bit not cleared (bsc#1111666).\n- ALSA: hda: Use scnprintf() for printing texts for sysfs/procfs (git-fixes).\n- ALSA: seq: Avoid concurrent access to queue flags (git-fixes).\n- ALSA: seq: Fix concurrent access to queue current tick/time (git-fixes).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: sh: Fix unused variable warnings (bsc#1111666).\n- ALSA: usb-audio: Apply sample rate quirk for Audioengine D1 (git-fixes).\n- ALSA: usb-audio: Fix endianess in descriptor validation (bsc#1111666).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ASoC: cs4349: Use PM ops \u0027cs4349_runtime_pm\u0027 (bsc#1051510).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: sun8i-codec: Fix setting DAI data format (git-fixes).\n- ata: ahci: Add shutdown to freeze hardware resources of ahci (bsc#1164388).\n- ath10k: Correct the DMA direction for management tx buffers (bsc#1111666).\n- ath10k: pci: Fix comment on ath10k_pci_dump_memory_sram (bsc#1111666).\n- ath10k: pci: Only dump ATH10K_MEM_REGION_TYPE_IOREG when safe (bsc#1111666).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front() (bsc#1163762).\n- bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front() (bsc#1163762).\n- bcache: add code comments for state-\u003epool in __btree_sort() (bsc#1163762).\n- bcache: add code comments for state-\u003epool in __btree_sort() (bsc#1163762).\n- bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n- bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n- bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n- bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n- bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n- bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n- bcache: add more accurate error messages in read_super() (bsc#1163762).\n- bcache: add more accurate error messages in read_super() (bsc#1163762).\n- bcache: add readahead cache policy options via sysfs interface (bsc#1163762).\n- bcache: add readahead cache policy options via sysfs interface (bsc#1163762).\n- bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n- bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (bsc#1163762).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (bsc#1163762).\n- bcache: check return value of prio_read() (bsc#1163762).\n- bcache: check return value of prio_read() (bsc#1163762).\n- bcache: deleted code comments for dead code in bch_data_insert_keys() (bsc#1163762).\n- bcache: deleted code comments for dead code in bch_data_insert_keys() (bsc#1163762).\n- bcache: do not export symbols (bsc#1163762).\n- bcache: do not export symbols (bsc#1163762).\n- bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n- bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n- bcache: fix a lost wake-up problem caused by mca_cannibalize_lock (bsc#1163762).\n- bcache: fix a lost wake-up problem caused by mca_cannibalize_lock (bsc#1163762).\n- bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n- bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n- bcache: fix deadlock in bcache_allocator (bsc#1163762).\n- bcache: fix deadlock in bcache_allocator (bsc#1163762).\n- bcache: fix incorrect data type usage in btree_flush_write() (bsc#1163762).\n- bcache: fix incorrect data type usage in btree_flush_write() (bsc#1163762).\n- bcache: fix memory corruption in bch_cache_accounting_clear() (bsc#1163762).\n- bcache: fix memory corruption in bch_cache_accounting_clear() (bsc#1163762).\n- bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n- bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n- bcache: ignore pending signals when creating gc and allocator thread (bsc#1163762, bsc#1112504).\n- bcache: ignore pending signals when creating gc and allocator thread (bsc#1163762, bsc#1112504).\n- bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n- bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n- bcache: reap c-\u003ebtree_cache_freeable from the tail in bch_mca_scan() (bsc#1163762).\n- bcache: reap c-\u003ebtree_cache_freeable from the tail in bch_mca_scan() (bsc#1163762).\n- bcache: reap from tail of c-\u003ebtree_cache in bch_mca_scan() (bsc#1163762).\n- bcache: reap from tail of c-\u003ebtree_cache in bch_mca_scan() (bsc#1163762).\n- bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n- bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n- bcache: remove member accessed from struct btree (bsc#1163762).\n- bcache: remove member accessed from struct btree (bsc#1163762).\n- bcache: remove the extra cflags for request.o (bsc#1163762).\n- bcache: remove the extra cflags for request.o (bsc#1163762).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (bsc#1163762, bsc#1112504).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (bsc#1163762, bsc#1112504).\n- bcma: remove set but not used variable \u0027sizel\u0027 (git-fixes).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840).\n- blk-mq: make sure that line break can be printed (bsc#1164098).\n- Bluetooth: Fix race condition in hci_release_sock() (bsc#1051510).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_p2p_create_p2pdev() (bsc#1111666).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- brcmfmac: sdio: Fix OOB interrupt initialization on brcm43362 (bsc#1111666).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: do not double lock the subvol_sem for rename exchange (bsc#1162943).\n- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- btrfs: fix infinite loop during fsync after rename operations (bsc#1163383).\n- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- btrfs: fix race between adding and putting tree mod seq elements and nodes (bsc#1163384).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1051510).\n- cdrom: respect device capabilities during opening action (boo#1164632).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix deadlocks in autodisconnect work (bsc#1111666).\n- cfg80211: fix memory leak in cfg80211_cqm_rssi_update (bsc#1111666).\n- chardev: Avoid potential use-after-free in \u0027chrdev_open()\u0027 (bsc#1163849).\n- cifs: fix mount option display for sec=krb5i (bsc#1161907).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: mmp2: Fix the order of timer mux parents (bsc#1051510).\n- clk: qcom: rcg2: Do not crash if our parent can\u0027t be found; return an error (bsc#1051510).\n- clk: sunxi-ng: add mux and pll notifiers for A64 CPU clock (bsc#1051510).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clk: tegra: Mark fuse clock as critical (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource: Prevent double add_timer_on() for watchdog_timer (bsc#1051510).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn-\u003ealg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: caam/qi2 - fix typo in algorithm\u0027s driver name (bsc#1111666).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- Documentation: Document arm64 kpti control (bsc#1162623).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drm/amd/display: Retrain dongles when SINK_COUNT becomes non-zero (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_device_set_cg_state\u0027 (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: fix ring test failure issue during s3 in vce 3.0 (V2) (bsc#1111666).\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027invalid\u0027 (bsc#1111666).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm/amdgpu/{uvd,vcn}: fetch ring\u0027s read_ptr after alloc (bsc#1111666).\n- drm/amd/powerplay: remove set but not used variable \u0027us_mvdd\u0027 (bsc#1111666).\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm/i915: Call dma_set_max_seg_size() in i915_driver_hw_probe() (bsc#1111666).\n- drm/i915: Handle vm_mmap error during I915_GEM_MMAP ioctl with WC set (bsc#1111666).\n- drm/i915: Make sure cdclk is high enough for DP audio on VLV/CHV (bsc#1111666).\n- drm/i915/perf: add missing delay for OA muxes configuration (bsc#1111666).\n- drm/i915: Sanity check mmap length against object size (bsc#1111666).\n- drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable (bsc#1111666).\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/nouveau/bar/gf100: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/bar/nv50: check bar1 vmm return value (bsc#1111666).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/nouveau/mmu: qualify vmm during dtor (bsc#1111666).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/rect: Avoid division by zero (bsc#1111666).\n- drm/rect: update kerneldoc for drm_rect_clip_scaled() (bsc#1111666).\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/sun4i: tcon: Set min division of TCON0_DCLK to 1 (bsc#1111666).\n- drm/sun4i: tcon: Set RGB DCLK min. divider based on hardware model (bsc#1111666).\n- drm/ttm: ttm_tt_init_fields() can be static (bsc#1111666).\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- Enable CONFIG_BLK_DEV_SR_VENDOR (boo#1164632).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- ext2: check err when partial != NULL (bsc#1163859).\n- ext4: check for directory entries too close to block end (bsc#1163861).\n- ext4: fix a bug in ext4_wait_for_tail_page_commit (bsc#1163841).\n- ext4: fix checksum errors with indexed dirs (bsc#1160979).\n- ext4: fix deadlock allocating crypto bounce page from mempool (bsc#1163842).\n- ext4: fix mount failure with quota configured as module (bsc#1164471).\n- ext4: fix mount failure with quota configured as module (bsc#1164471).\n- ext4: Fix mount failure with quota configured as module (bsc#1164471).\n- ext4: improve explanation of a mount failure caused by a misconfigured kernel (bsc#1163843).\n- ext4, jbd2: ensure panic when aborting with zero errno (bsc#1163853).\n- firestream: fix memory leaks (bsc#1051510).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- fscrypt: do not set policy for a dead directory (bsc#1163846).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/open.c: allow opening only regular files during execve() (bsc#1163845).\n- ftrace: Add comment to why rcu_dereference_sched() is open coded (git-fixes).\n- ftrace: Protect ftrace_graph_hash with ftrace_sync (git-fixes).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- gtp: avoid zero size hashtable (networking-stable-20_01_01).\n- gtp: do not allow adding duplicate tid and ms_addr pdp context (networking-stable-20_01_01).\n- gtp: fix an use-after-free in ipv4_pdp_find() (networking-stable-20_01_01).\n- gtp: fix wrong condition in gtp_genl_dump_pdp() (networking-stable-20_01_01).\n- hotplug/drc-info: Add code to search ibm,drc-info property (bsc#1157480 ltc#181028).\n- hv_netvsc: Fix offset usage in netvsc_send_table() (bsc#1164598).\n- hv_netvsc: Fix send_table offset in case of a host bug (bsc#1164598).\n- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1164598).\n- hv_netvsc: Fix unwanted rx_table reset (bsc#1164598).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (k10temp) Add support for AMD family 17h, model 70h CPUs (bsc#1163206).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- hwmon: (pmbus/ltc2978) Fix PMBus polling of MFR_COMMON definitions (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- init: add arch_call_rest_init to allow stack switching (jsc#SLE-11179).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- iommu/amd: Fix IOMMU perf counter clobbering during init (bsc#1162617).\n- iommu/arm-smmu-v3: Populate VMID field for CMDQ_OP_TLBI_NH_VA (bsc#1164314).\n- iommu/io-pgtable-arm: Fix race handling in split_blk_unmap() (bsc#1164115).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: clear persistence bit according to device family (bsc#1111666).\n- iwlwifi: do not throw error when trying to remove IGTK (bsc#1051510).\n- iwlwifi: mvm: fix NVM check for 3168 devices (bsc#1051510).\n- iwlwifi: trans: Clear persistence bit when starting the FW (bsc#1111666).\n- jbd2: clear JBD2_ABORT flag before journal_reset to update log tail info when load journal (bsc#1163862).\n- jbd2: do not clear the BH_Mapped flag when forgetting a metadata buffer (bsc#1163836).\n- jbd2: Fix possible overflow in jbd2_log_space_left() (bsc#1163860).\n- jbd2: make sure ESHUTDOWN to be recorded in the journal superblock (bsc#1163863).\n- jbd2: move the clearing of b_modified flag to the journal_unmap_buffer() (bsc#1163880).\n- jbd2: switch to use jbd2_journal_abort() when failed to submit the commit record (bsc#1163852).\n- kabi/severities: Whitelist rpaphp_get_drc_props (bsc#1157480 ltc#181028).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kconfig: fix broken dependency in randconfig-generated .config (bsc#1051510).\n- kernel-binary.spec.in: do not recommend firmware for kvmsmall and azure flavor (boo#1161360).\n- KVM: Clean up __kvm_gfn_to_hva_cache_init() and its callers (bsc#1133021).\n- KVM: fix spectrev1 gadgets (bsc#1164705).\n- KVM: PPC: Book3S HV: Uninit vCPU if vcore creation fails (bsc#1061840).\n- KVM: PPC: Book3S PR: Fix -Werror=return-type build failure (bsc#1061840).\n- KVM: PPC: Book3S PR: Free shared page if mmu initialization fails (bsc#1061840).\n- KVM: SVM: Override default MMIO mask if memory encryption is enabled (bsc#1162618).\n- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).\n- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).\n- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).\n- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).\n- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).\n- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).\n- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).\n- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).\n- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).\n- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).\n- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).\n- lcoking/rwsem: Add missing ACQUIRE to read_slowpath sleep loop (bsc#1050549).\n- lib: crc64: include \u0026lt;linux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- lib: crc64: include \u0026lt;linux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- libnvdimm: Fix devm_nsio_enable() kabi (bsc#1153535).\n- libnvdimm/namespace: Differentiate between probe mapping and runtime mapping (bsc#1153535).\n- libnvdimm/pfn: Account for PAGE_SIZE \u003e info-block-size in nd_pfn_init() (bsc#1127682 bsc#1153535 ltc#175033 ltc#181834).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- livepatch: Simplify stack trace retrieval (jsc#SLE-11179).\n- locking/rwsem: Prevent decrement of reader count before increment (bsc#1050549).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- mac80211: fix ieee80211_txq_setup_flows() failure path (bsc#1111666).\n- mac80211: Fix TKIP replay protection immediately after key setup (bsc#1051510).\n- mac80211: mesh: restrict airtime metric to peered established plinks (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- md/raid0: Fix buffer overflow at debug print (bsc#1164051).\n- media: af9005: uninitialized variable printked (bsc#1051510).\n- media: cec: CEC 2.0-only bcast messages were ignored (git-fixes).\n- media: digitv: do not continue if remote control state can\u0027t be read (bsc#1051510).\n- media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0 (bsc#1051510).\n- media: exynos4-is: fix wrong mdev and v4l2 dev order in error path (git-fixes).\n- media: gspca: zero usb_buf (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov6650: Fix crop rectangle alignment not passed back (git-fixes).\n- media: ov6650: Fix incorrect use of JPEG colorspace (git-fixes).\n- media: pulse8-cec: fix lost cec_transmit_attempt_done() call.\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media/v4l2-core: set pages dirty upon releasing DMA buffers (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- mfd: da9062: Fix watchdog compatible string (bsc#1051510).\n- mfd: dln2: More sanity checking for endpoints (bsc#1051510).\n- mfd: rn5t618: Mark ADC control register volatile (bsc#1051510).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: spi: Toggle SPI polarity, do not hardcode it (bsc#1051510).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mod_devicetable: fix PHY module format (networking-stable-19_12_28).\n- mtd: fix mtd_oobavail() incoherent returned value (bsc#1051510).\n- mwifiex: delete unused mwifiex_get_intf_num() (bsc#1111666).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- mwifiex: update set_mac_address logic (bsc#1111666).\n- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1163851).\n- net: add sendmsg_locked and sendpage_locked to af_inet6 (bsc#1144162).\n- net: dst: Force 4-byte alignment of dst_metrics (networking-stable-19_12_28).\n- net: ena: fix napi handler misbehavior when the napi budget is zero (networking-stable-20_01_01).\n- net: hisilicon: Fix a BUG trigered by wrong bytes_compl (networking-stable-19_12_28).\n- net: nfc: nci: fix a possible sleep-in-atomic-context bug in nci_uart_tty_receive() (networking-stable-19_12_28).\n- net: qlogic: Fix error paths in ql_alloc_large_buffers() (networking-stable-19_12_28).\n- net: sched: correct flower port blocking (git-fixes).\n- net: usb: lan78xx: Fix suspend/resume PHY register access error (networking-stable-19_12_28).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- nvme: fix the parameter order for nvme_get_log in nvme_get_fw_slot_info (bsc#1163774).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- PCI: Add DMA alias quirk for Intel VCA NTB (bsc#1051510).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI/IOV: Fix memory leak in pci_iov_add_virtfn() (git-fixes).\n- PCI: rpaphp: Add drc-info support for hotplug slot registration (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Annotate and correctly byte swap DRC properties (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Avoid a sometimes-uninitialized warning (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Correctly match ibm, my-drc-index to drc-name when using drc-info (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Do not rely on firmware feature to imply drc-info support (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Fix up pointer to first drc-info entry (bsc#1157480 ltc#181028).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1114279).\n- perf/x86/intel: Fix inaccurate period in context switch for auto-reload (bsc#1164315).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctrl: cherryview: Fix irq_valid_mask calculation (bsc#1111666).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- powerpc: avoid adjusting memory_limit for capture kernel memory reservation (bsc#1140025 ltc#176086).\n- powerpc: Enable support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/papr_scm: Do not enable direct map for a region by default (bsc#1129551).\n- powerpc/papr_scm: Fix leaking \u0027bus_desc.provider_name\u0027 in some paths (bsc#1142685 ltc#179509).\n- powerpc/pseries: Add cpu DLPAR support for drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Advance pfn if section is not present in lmb_is_removable() (bsc#1065729).\n- powerpc/pseries: Allow not having ibm, hypertas-functions::hcall-multi-tce for DDW (bsc#1065729).\n- powerpc/pseries: Enable support for ibm,drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix bad drc_index_start value parsing of drc-info entry (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix drc-info mappings of logical cpus to drc-index (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix vector5 in ibm architecture vector table (bsc#1157480 ltc#181028).\n- powerpc/pseries/hotplug-memory: Change rc variable to bool (bsc#1065729).\n- powerpc/pseries: Revert support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc/pseries/vio: Fix iommu_table use-after-free refcount warning (bsc#1065729).\n- powerpc: reserve memory for capture kernel after hugepages init (bsc#1140025 ltc#176086).\n- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- power: supply: ltc2941-battery-gauge: fix use-after-free (bsc#1051510).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- pseries/drc-info: Search DRC properties for CPU indexes (bsc#1157480 ltc#181028).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- pwm: omap-dmtimer: Remove PWM chip in .remove before making it unfunctional (git-fixes).\n- pwm: Remove set but not set variable \u0027pwm\u0027 (git-fixes).\n- pxa168fb: Fix the function used to release some memory in an error (bsc#1114279)\n- qede: Fix multicast mac configuration (networking-stable-19_12_28).\n- qmi_wwan: Add support for Quectel RM500Q (bsc#1051510).\n- quota: Check that quota is not dirty before release (bsc#1163858).\n- quota: fix livelock in dquot_writeback_dquots (bsc#1163857).\n- r8152: get default setting of WOL before initializing (bsc#1051510).\n- README.BRANCH: Update the branch name to cve/linux-4.12\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- reiserfs: Fix memory leak of journal device string (bsc#1163867).\n- reiserfs: Fix spurious unlock in reiserfs_fill_super() error handling (bsc#1163869).\n- Revert \u0027ath10k: fix DMA related firmware crashes on multiple devices\u0027 (git-fixes).\n- Revert \u0027Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers\u0027 (bsc#1051510).\n- Revert \u0027locking/pvqspinlock: Do not wait if vCPU is preempted\u0027 (bsc#1050549).\n- rpm/kabi.pl: support new (\u003e=5.4) Module.symvers format (new symbol namespace field)\n- rpm/kernel-binary.spec.in: Conflict with too old powerpc-utils (jsc#ECO-920, jsc#SLE-11054, jsc#SLE-11322).\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- rsi_91x_usb: fix interface sanity check (git-fixes).\n- rtc: cmos: Stop using shared IRQ (bsc#1051510).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: hym8563: Return -EINVAL if the time is known to be invalid (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in \u0027max8997_rtc_read_alarm()\u0027 (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf\u0027s type to u8 in s35390a_init (bsc#1051510).\n- rtl8xxxu: fix interface sanity check (git-fixes).\n- rtlwifi: Fix MAX MPDU of VHT capability (git-fixes).\n- rtlwifi: Remove redundant semicolon in wifi.h (git-fixes).\n- s390: add stack switch helper (jsc#SLE-11179).\n- s390: add support for virtually mapped kernel stacks (jsc#SLE-11179).\n- s390: always inline current_stack_pointer() (jsc#SLE-11179).\n- s390: always inline disabled_wait (jsc#SLE-11179).\n- s390: avoid misusing CALL_ON_STACK for task stack setup (jsc#SLE-11179).\n- s390: clean up stacks setup (jsc#SLE-11179).\n- s390: correct CALL_ON_STACK back_chain saving (jsc#SLE-11179).\n- s390: disable preemption when switching to nodat stack with CALL_ON_STACK (jsc#SLE-11179).\n- s390: fine-tune stack switch helper (jsc#SLE-11179).\n- s390: fix register clobbering in CALL_ON_STACK (jsc#SLE-11179).\n- s390/ftrace: generate traced function stack frame (jsc#SLE-11178 jsc#SLE-11179).\n- s390/ftrace: save traced function caller (jsc#SLE-11179).\n- s390/ftrace: use HAVE_FUNCTION_GRAPH_RET_ADDR_PTR (jsc#SLE-11179).\n- s390/head64: correct init_task stack setup (jsc#SLE-11179).\n- s390: kabi workaround for ftrace_ret_stack (jsc#SLE-11179).\n- s390: kabi workaround for lowcore changes due to vmap stack (jsc#SLE-11179).\n- s390: kabi workaround for reliable stack tracing (jsc#SLE-11179).\n- s390/kasan: avoid false positives during stack unwind (jsc#SLE-11179).\n- s390/kasan: avoid report in get_wchan (jsc#SLE-11179).\n- s390/livepatch: Implement reliable stack tracing for the consistency model (jsc#SLE-11179).\n- s390: preserve kabi for stack unwind API (jsc#SLE-11179).\n- s390/process: avoid custom stack unwinding in get_wchan (jsc#SLE-11179).\n- s390/stacktrace: use common arch_stack_walk infrastructure (jsc#SLE-11179).\n- s390/suspend: fix stack setup in swsusp_arch_suspend (jsc#SLE-11179).\n- s390/test_unwind: print verbose unwinding results (jsc#SLE-11179).\n- s390: unify stack size definitions (jsc#SLE-11179).\n- s390/unwind: add stack pointer alignment sanity checks (jsc#SLE-11179).\n- s390/unwind: always inline get_stack_pointer (jsc#SLE-11179).\n- s390/unwind: avoid int overflow in outside_of_stack (jsc#SLE-11179).\n- s390/unwind: cleanup unused READ_ONCE_TASK_STACK (jsc#SLE-11179).\n- s390/unwind: correct stack switching during unwind (jsc#SLE-11179).\n- s390/unwind: drop unnecessary code around calling ftrace_graph_ret_addr() (jsc#SLE-11179).\n- s390/unwind: filter out unreliable bogus %r14 (jsc#SLE-11179).\n- s390/unwind: fix get_stack_pointer(NULL, NULL) (jsc#SLE-11179).\n- s390/unwind: fix mixing regs and sp (jsc#SLE-11179).\n- s390/unwind: introduce stack unwind API (jsc#SLE-11179).\n- s390/unwind: make reuse_sp default when unwinding pt_regs (jsc#SLE-11179).\n- s390/unwind: remove stack recursion warning (jsc#SLE-11179).\n- s390/unwind: report an error if pt_regs are not on stack (jsc#SLE-11179).\n- s390/unwind: start unwinding from reliable state (jsc#SLE-11179).\n- s390/unwind: stop gracefully at task pt_regs (jsc#SLE-11179).\n- s390/unwind: stop gracefully at user mode pt_regs in irq stack (jsc#SLE-11179).\n- s390/unwind: unify task is current checks (jsc#SLE-11179).\n- scsi: qla2xxx: Fix a NULL pointer dereference in an error path (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix unbound NVME response length (bsc#1157966 bsc#1158013 bsc#1157424).\n- sctp: fully initialize v4 addr in some functions (networking-stable-19_12_28).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- soc/tegra: fuse: Correct straps\u0027 address for older Tegra124 device trees (bsc#1051510).\n- soc: ti: wkup_m3_ipc: Fix race condition with rproc_boot (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- sr_vendor: support Beurer GL50 evo CD-on-a-chip devices (boo#1164632).\n- stacktrace: Do not skip first entry on noncurrent tasks (jsc#SLE-11179).\n- stacktrace: Force USER_DS for stack_trace_save_user() (jsc#SLE-11179).\n- stacktrace: Get rid of unneeded \u0027!!\u0027 pattern (jsc#SLE-11179).\n- stacktrace: Provide common infrastructure (jsc#SLE-11179).\n- stacktrace: Provide helpers for common stack trace operations (jsc#SLE-11179).\n- stacktrace: Unbreak stack_trace_save_tsk_reliable() (jsc#SLE-11179).\n- stacktrace: Use PF_KTHREAD to check for kernel threads (jsc#SLE-11179).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- Staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: vt6656: correct packet types for CTS protect, mode (bsc#1051510).\n- staging: vt6656: Fix false Tx excessive retries reporting (bsc#1051510).\n- staging: vt6656: use NULLFUCTION stack on mac80211 (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- stop_machine: Atomically queue and wake stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption after queueing stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption when waking two stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810, bsc#1161702).\n- swiotlb: do not panic on mapping failures (bsc#1162171).\n- swiotlb: remove the overflow buffer (bsc#1162171).\n- tcp: do not send empty skb from tcp_write_xmit() (networking-stable-20_01_01).\n- tracing: Annotate ftrace_graph_hash pointer with __rcu (git-fixes).\n- tracing: Annotate ftrace_graph_notrace_hash pointer with __rcu (git-fixes).\n- tracing: Cleanup stack trace code (jsc#SLE-11179).\n- tracing: Fix tracing_stat return values in error handling paths (git-fixes).\n- tracing: Fix very unlikely race of registering two stat tracers (git-fixes).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- ubifs: do not trigger assertion on invalid no-key filename (bsc#1163850).\n- ubifs: Fix deadlock in concurrent bulk-read and writepage (bsc#1163856).\n- ubifs: Fix FS_IOC_SETFLAGS unexpectedly clearing encrypt flag (bsc#1163855).\n- ubifs: Reject unsupported ioctl flags explicitly (bsc#1163844).\n- udp: fix integer overflow while computing available space in sk_rcvbuf (networking-stable-20_01_01).\n- USB: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- USB: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- USB: core: fix check for duplicate endpoints (git-fixes).\n- USB: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- USB: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- USB: EHCI: Do not return -EPIPE when hub is disconnected (git-fixes).\n- USB: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: legacy: set max_speed to super-speed (bsc#1051510).\n- USB: gadget: Zero ffs_io_data (bsc#1051510).\n- USB: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- usbip: Fix error path of vhci_recv_ret_submit() (git-fixes).\n- USB: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- USB: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- USB: roles: fix a potential use after free (git-fixes).\n- USB: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- USB: serial: io_edgeport: use irqsave() in USB\u0027s complete callback (bsc#1051510).\n- USB: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- USB: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- USB: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- USB: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- USB: serial: option: add support for Quectel RM500Q in QDL mode (git-fixes).\n- USB: serial: option: add Telit ME910G1 0x110a composition (git-fixes).\n- USB: serial: option: add ZLP support for 0x1bc7/0x9010 (git-fixes).\n- USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- usb-storage: Disable UAS on JMicron SATA enclosure (bsc#1051510).\n- USB: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- vhost/vsock: accept only packets with the right dst_cid (networking-stable-20_01_01).\n- virtio_ring: fix unmap of indirect descriptors (bsc#1162171).\n- watchdog: max77620_wdt: fix potential build errors (bsc#1051510).\n- watchdog: rn5t618_wdt: fix module aliases (bsc#1051510).\n- watchdog: wdat_wdt: fix get_timeleft call for wdat_wdt (bsc#1162557).\n- wireless: fix enabling channel 12 for custom regulatory domain (bsc#1051510).\n- wireless: wext: avoid gcc -O3 warning (bsc#1051510).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 70h (bsc#1163206).\n- x86/cpu: Update cached HLE state on write to TSX_CTRL_CPUID_CLEAR (bsc#1162619).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/resctrl: Check monitoring static key in the MBM overflow handler (bsc#1114279).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free when deleting resource groups (bsc#1114279).\n- x86/resctrl: Prevent possible overrun during bitmap operations (bsc#1114648).\n- xen/balloon: Support xend-based toolstack take two (bsc#1065600).\n- xen: Enable interrupts when calling _cond_resched() (bsc#1065600).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-667,SUSE-SLE-RT-12-SP5-2020-667",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0667-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:0667-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200667-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:0667-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050549",
        "url": "https://bugzilla.suse.com/1050549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061840",
        "url": "https://bugzilla.suse.com/1061840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085030",
        "url": "https://bugzilla.suse.com/1085030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088810",
        "url": "https://bugzilla.suse.com/1088810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1105392",
        "url": "https://bugzilla.suse.com/1105392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111666",
        "url": "https://bugzilla.suse.com/1111666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112504",
        "url": "https://bugzilla.suse.com/1112504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114648",
        "url": "https://bugzilla.suse.com/1114648"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118338",
        "url": "https://bugzilla.suse.com/1118338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127682",
        "url": "https://bugzilla.suse.com/1127682"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129551",
        "url": "https://bugzilla.suse.com/1129551"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133147",
        "url": "https://bugzilla.suse.com/1133147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1140025",
        "url": "https://bugzilla.suse.com/1140025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1142685",
        "url": "https://bugzilla.suse.com/1142685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144162",
        "url": "https://bugzilla.suse.com/1144162"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152107",
        "url": "https://bugzilla.suse.com/1152107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153535",
        "url": "https://bugzilla.suse.com/1153535"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154243",
        "url": "https://bugzilla.suse.com/1154243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156609",
        "url": "https://bugzilla.suse.com/1156609"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157042",
        "url": "https://bugzilla.suse.com/1157042"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157158",
        "url": "https://bugzilla.suse.com/1157158"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157424",
        "url": "https://bugzilla.suse.com/1157424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157480",
        "url": "https://bugzilla.suse.com/1157480"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157966",
        "url": "https://bugzilla.suse.com/1157966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158013",
        "url": "https://bugzilla.suse.com/1158013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159271",
        "url": "https://bugzilla.suse.com/1159271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159955",
        "url": "https://bugzilla.suse.com/1159955"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160218",
        "url": "https://bugzilla.suse.com/1160218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160979",
        "url": "https://bugzilla.suse.com/1160979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161360",
        "url": "https://bugzilla.suse.com/1161360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161552",
        "url": "https://bugzilla.suse.com/1161552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161702",
        "url": "https://bugzilla.suse.com/1161702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161907",
        "url": "https://bugzilla.suse.com/1161907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161931",
        "url": "https://bugzilla.suse.com/1161931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161933",
        "url": "https://bugzilla.suse.com/1161933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161934",
        "url": "https://bugzilla.suse.com/1161934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161935",
        "url": "https://bugzilla.suse.com/1161935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161936",
        "url": "https://bugzilla.suse.com/1161936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161937",
        "url": "https://bugzilla.suse.com/1161937"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162067",
        "url": "https://bugzilla.suse.com/1162067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162109",
        "url": "https://bugzilla.suse.com/1162109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162139",
        "url": "https://bugzilla.suse.com/1162139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162171",
        "url": "https://bugzilla.suse.com/1162171"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162557",
        "url": "https://bugzilla.suse.com/1162557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162617",
        "url": "https://bugzilla.suse.com/1162617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162618",
        "url": "https://bugzilla.suse.com/1162618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162619",
        "url": "https://bugzilla.suse.com/1162619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162623",
        "url": "https://bugzilla.suse.com/1162623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162943",
        "url": "https://bugzilla.suse.com/1162943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163206",
        "url": "https://bugzilla.suse.com/1163206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163383",
        "url": "https://bugzilla.suse.com/1163383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163384",
        "url": "https://bugzilla.suse.com/1163384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163762",
        "url": "https://bugzilla.suse.com/1163762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163774",
        "url": "https://bugzilla.suse.com/1163774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163836",
        "url": "https://bugzilla.suse.com/1163836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163840",
        "url": "https://bugzilla.suse.com/1163840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163841",
        "url": "https://bugzilla.suse.com/1163841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163842",
        "url": "https://bugzilla.suse.com/1163842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163843",
        "url": "https://bugzilla.suse.com/1163843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163844",
        "url": "https://bugzilla.suse.com/1163844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163845",
        "url": "https://bugzilla.suse.com/1163845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163846",
        "url": "https://bugzilla.suse.com/1163846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163849",
        "url": "https://bugzilla.suse.com/1163849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163850",
        "url": "https://bugzilla.suse.com/1163850"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163851",
        "url": "https://bugzilla.suse.com/1163851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163852",
        "url": "https://bugzilla.suse.com/1163852"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163853",
        "url": "https://bugzilla.suse.com/1163853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163855",
        "url": "https://bugzilla.suse.com/1163855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163856",
        "url": "https://bugzilla.suse.com/1163856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163857",
        "url": "https://bugzilla.suse.com/1163857"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163858",
        "url": "https://bugzilla.suse.com/1163858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163859",
        "url": "https://bugzilla.suse.com/1163859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163860",
        "url": "https://bugzilla.suse.com/1163860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163861",
        "url": "https://bugzilla.suse.com/1163861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163862",
        "url": "https://bugzilla.suse.com/1163862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163863",
        "url": "https://bugzilla.suse.com/1163863"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163867",
        "url": "https://bugzilla.suse.com/1163867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163869",
        "url": "https://bugzilla.suse.com/1163869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163880",
        "url": "https://bugzilla.suse.com/1163880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163971",
        "url": "https://bugzilla.suse.com/1163971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164051",
        "url": "https://bugzilla.suse.com/1164051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164098",
        "url": "https://bugzilla.suse.com/1164098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164115",
        "url": "https://bugzilla.suse.com/1164115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164314",
        "url": "https://bugzilla.suse.com/1164314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164315",
        "url": "https://bugzilla.suse.com/1164315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164388",
        "url": "https://bugzilla.suse.com/1164388"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164471",
        "url": "https://bugzilla.suse.com/1164471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164598",
        "url": "https://bugzilla.suse.com/1164598"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164632",
        "url": "https://bugzilla.suse.com/1164632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164705",
        "url": "https://bugzilla.suse.com/1164705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164712",
        "url": "https://bugzilla.suse.com/1164712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164727",
        "url": "https://bugzilla.suse.com/1164727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164728",
        "url": "https://bugzilla.suse.com/1164728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164729",
        "url": "https://bugzilla.suse.com/1164729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164730",
        "url": "https://bugzilla.suse.com/1164730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164731",
        "url": "https://bugzilla.suse.com/1164731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164732",
        "url": "https://bugzilla.suse.com/1164732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164733",
        "url": "https://bugzilla.suse.com/1164733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164734",
        "url": "https://bugzilla.suse.com/1164734"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164735",
        "url": "https://bugzilla.suse.com/1164735"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14895 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14895/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16746 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16746/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8428 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8428/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-03-13T08:26:59Z",
      "generator": {
        "date": "2020-03-13T08:26:59Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:0667-1",
      "initial_release_date": "2020-03-13T08:26:59Z",
      "revision_history": [
        {
          "date": "2020-03-13T08:26:59Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-4.12.14-10.5.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-4.12.14-10.5.1.noarch",
                  "product_id": "kernel-devel-rt-4.12.14-10.5.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-4.12.14-10.5.1.noarch",
                "product": {
                  "name": "kernel-source-rt-4.12.14-10.5.1.noarch",
                  "product_id": "kernel-source-rt-4.12.14-10.5.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-4.12.14-10.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-4.12.14-10.5.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-4.12.14-10.5.1.x86_64",
                  "product_id": "dlm-kmp-rt-4.12.14-10.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
                  "product_id": "gfs2-kmp-rt-4.12.14-10.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-4.12.14-10.5.1.x86_64",
                "product": {
                  "name": "kernel-rt-4.12.14-10.5.1.x86_64",
                  "product_id": "kernel-rt-4.12.14-10.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-base-4.12.14-10.5.1.x86_64",
                "product": {
                  "name": "kernel-rt-base-4.12.14-10.5.1.x86_64",
                  "product_id": "kernel-rt-base-4.12.14-10.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-4.12.14-10.5.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-4.12.14-10.5.1.x86_64",
                  "product_id": "kernel-rt-devel-4.12.14-10.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-4.12.14-10.5.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-4.12.14-10.5.1.x86_64",
                  "product_id": "kernel-rt_debug-4.12.14-10.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-4.12.14-10.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-4.12.14-10.5.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-4.12.14-10.5.1.x86_64",
                  "product_id": "kernel-syms-rt-4.12.14-10.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-4.12.14-10.5.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-4.12.14-10.5.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Real Time 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Real Time 12 SP5",
                  "product_id": "SUSE Linux Enterprise Real Time 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-4.12.14-10.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-4.12.14-10.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-4.12.14-10.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-4.12.14-10.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-4.12.14-10.5.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch"
        },
        "product_reference": "kernel-devel-rt-4.12.14-10.5.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-4.12.14-10.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64"
        },
        "product_reference": "kernel-rt-4.12.14-10.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-base-4.12.14-10.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64"
        },
        "product_reference": "kernel-rt-base-4.12.14-10.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-4.12.14-10.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-4.12.14-10.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-4.12.14-10.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-4.12.14-10.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-4.12.14-10.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-4.12.14-10.5.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch"
        },
        "product_reference": "kernel-source-rt-4.12.14-10.5.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-4.12.14-10.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-4.12.14-10.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-4.12.14-10.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-4.12.14-10.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-14895",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14895"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14895",
          "url": "https://www.suse.com/security/cve/CVE-2019-14895"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157042 for CVE-2019-14895",
          "url": "https://bugzilla.suse.com/1157042"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157158 for CVE-2019-14895",
          "url": "https://bugzilla.suse.com/1157158"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173100 for CVE-2019-14895",
          "url": "https://bugzilla.suse.com/1173100"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173660 for CVE-2019-14895",
          "url": "https://bugzilla.suse.com/1173660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T08:26:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14895"
    },
    {
      "cve": "CVE-2019-16746",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16746"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16746",
          "url": "https://www.suse.com/security/cve/CVE-2019-16746"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1152107 for CVE-2019-16746",
          "url": "https://bugzilla.suse.com/1152107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173659 for CVE-2019-16746",
          "url": "https://bugzilla.suse.com/1173659"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T08:26:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-16746"
    },
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T08:26:59Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-8428",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8428"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8428",
          "url": "https://www.suse.com/security/cve/CVE-2020-8428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162109 for CVE-2020-8428",
          "url": "https://bugzilla.suse.com/1162109"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T08:26:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8428"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T08:26:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.5.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.5.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T08:26:59Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    }
  ]
}
  suse-su-2020:0649-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 12-SP4 kernel-RT was updated to 4.12.14 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-8992: Fixed an issue in ext4_protect_reserved_inode in fs/ext4/block_validity.c that allowed attackers to cause a soft lockup via a crafted journal size (bsc#1164069).\n- CVE-2020-8648: Fixed a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).\n- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).\n- CVE-2020-8428: There was a use-after-free bug in fs/namei.c, which allowed local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9 (bsc#1162109).\n\nThe following non-security bugs were fixed:\n\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI: PM: Avoid attaching ACPI PM domain to certain devices (bsc#1051510).\n- ACPI / video: Add force_none quirk for Dell OptiPlex 9020M (bsc#1051510).\n- ACPI: video: Do not export a non working backlight interface on MSI MS-7721 boards (bsc#1051510).\n- ACPI: watchdog: Allow disabling WDAT at boot (bsc#1162557).\n- ACPI / watchdog: Fix init failure with overlapping register regions (bsc#1162557).\n- ACPI / watchdog: Set default timeout in probe (bsc#1162557).\n- ALSA: hda/realtek - Fix silent output on MSI-GL73 (git-fixes).\n- ALSA: hda: Reset stream if DMA RUN bit not cleared (bsc#1111666).\n- ALSA: hda: Use scnprintf() for printing texts for sysfs/procfs (git-fixes).\n- ALSA: seq: Avoid concurrent access to queue flags (git-fixes).\n- ALSA: seq: Fix concurrent access to queue current tick/time (git-fixes).\n- ALSA: usb-audio: Apply sample rate quirk for Audioengine D1 (git-fixes).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ASoC: sun8i-codec: Fix setting DAI data format (git-fixes).\n- ata: ahci: Add shutdown to freeze hardware resources of ahci (bsc#1164388).\n- bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front() (bsc#1163762).\n- bcache: add code comments for state-\u003epool in __btree_sort() (bsc#1163762).\n- bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n- bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n- bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n- bcache: add more accurate error messages in read_super() (bsc#1163762).\n- bcache: add readahead cache policy options via sysfs interface (bsc#1163762).\n- bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (bsc#1163762).\n- bcache: check return value of prio_read() (bsc#1163762).\n- bcache: deleted code comments for dead code in bch_data_insert_keys() (bsc#1163762).\n- bcache: do not export symbols (bsc#1163762).\n- bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n- bcache: fix a lost wake-up problem caused by mca_cannibalize_lock (bsc#1163762).\n- bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n- bcache: fix deadlock in bcache_allocator (bsc#1163762).\n- bcache: fix incorrect data type usage in btree_flush_write() (bsc#1163762).\n- bcache: fix memory corruption in bch_cache_accounting_clear() (bsc#1163762).\n- bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n- bcache: ignore pending signals when creating gc and allocator thread (bsc#1163762, bsc#1112504).\n- bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n- bcache: reap c-\u003ebtree_cache_freeable from the tail in bch_mca_scan() (bsc#1163762).\n- bcache: reap from tail of c-\u003ebtree_cache in bch_mca_scan() (bsc#1163762).\n- bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n- bcache: remove member accessed from struct btree (bsc#1163762).\n- bcache: remove the extra cflags for request.o (bsc#1163762).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (bsc#1163762, bsc#1112504).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840).\n- blk-mq: make sure that line break can be printed (bsc#1164098).\n- Bluetooth: Fix race condition in hci_release_sock() (bsc#1051510).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- Btrfs: do not double lock the subvol_sem for rename exchange (bsc#1162943).\n- Btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- Btrfs: fix infinite loop during fsync after rename operations (bsc#1163383).\n- Btrfs: fix race between adding and putting tree mod seq elements and nodes (bsc#1163384).\n- Btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- cdrom: respect device capabilities during opening action (boo#1164632).\n- chardev: Avoid potential use-after-free in \u0027chrdev_open()\u0027 (bsc#1163849).\n- cifs: fix mount option display for sec=krb5i (bsc#1161907).\n- clk: mmp2: Fix the order of timer mux parents (bsc#1051510).\n- clk: qcom: rcg2: Do not crash if our parent can\u0027t be found; return an error (bsc#1051510).\n- clk: sunxi-ng: add mux and pll notifiers for A64 CPU clock (bsc#1051510).\n- clk: tegra: Mark fuse clock as critical (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource: Prevent double add_timer_on() for watchdog_timer (bsc#1051510).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- Documentation: Document arm64 kpti control (bsc#1162623).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- Enable CONFIG_BLK_DEV_SR_VENDOR (boo#1164632).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- ext2: check err when partial != NULL (bsc#1163859).\n- ext4: check for directory entries too close to block end (bsc#1163861).\n- ext4: fix a bug in ext4_wait_for_tail_page_commit (bsc#1163841).\n- ext4: fix checksum errors with indexed dirs (bsc#1160979).\n- ext4: fix deadlock allocating crypto bounce page from mempool (bsc#1163842).\n- ext4: Fix mount failure with quota configured as module (bsc#1164471).\n- ext4: improve explanation of a mount failure caused by a misconfigured kernel (bsc#1163843).\n- ext4, jbd2: ensure panic when aborting with zero errno (bsc#1163853).\n- firestream: fix memory leaks (bsc#1051510).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- fix the locking in dcache_readdir() and friends (bsc#1123328).\n- fscrypt: do not set policy for a dead directory (bsc#1163846).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/open.c: allow opening only regular files during execve() (bsc#1163845).\n- ftrace: Add comment to why rcu_dereference_sched() is open coded (git-fixes).\n- ftrace: Protect ftrace_graph_hash with ftrace_sync (git-fixes).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- gtp: avoid zero size hashtable (networking-stable-20_01_01).\n- gtp: do not allow adding duplicate tid and ms_addr pdp context (networking-stable-20_01_01).\n- gtp: fix an use-after-free in ipv4_pdp_find() (networking-stable-20_01_01).\n- gtp: fix wrong condition in gtp_genl_dump_pdp() (networking-stable-20_01_01).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- hwmon: (pmbus/ltc2978) Fix PMBus polling of MFR_COMMON definitions (bsc#1051510).\n- iommu/amd: Fix IOMMU perf counter clobbering during init (bsc#1162617).\n- iommu/arm-smmu-v3: Populate VMID field for CMDQ_OP_TLBI_NH_VA (bsc#1164314).\n- iommu/io-pgtable-arm: Fix race handling in split_blk_unmap() (bsc#1164115).\n- iwlwifi: do not throw error when trying to remove IGTK (bsc#1051510).\n- iwlwifi: mvm: fix NVM check for 3168 devices (bsc#1051510).\n- jbd2: clear JBD2_ABORT flag before journal_reset to update log tail info when load journal (bsc#1163862).\n- jbd2: do not clear the BH_Mapped flag when forgetting a metadata buffer (bsc#1163836).\n- jbd2: Fix possible overflow in jbd2_log_space_left() (bsc#1163860).\n- jbd2: make sure ESHUTDOWN to be recorded in the journal superblock (bsc#1163863).\n- jbd2: move the clearing of b_modified flag to the journal_unmap_buffer() (bsc#1163880).\n- jbd2: switch to use jbd2_journal_abort() when failed to submit the commit record (bsc#1163852).\n- kconfig: fix broken dependency in randconfig-generated .config (bsc#1051510).\n- kernel-binary.spec.in: do not recommend firmware for kvmsmall and azure flavor (boo#1161360).\n- KVM: Clean up __kvm_gfn_to_hva_cache_init() and its callers (bsc#1133021).\n- KVM: fix spectrev1 gadgets (bsc#1164705).\n- KVM: PPC: Book3S HV: Uninit vCPU if vcore creation fails (bsc#1061840).\n- KVM: PPC: Book3S PR: Fix -Werror=return-type build failure (bsc#1061840).\n- KVM: PPC: Book3S PR: Free shared page if mmu initialization fails (bsc#1061840).\n- KVM: SVM: Override default MMIO mask if memory encryption is enabled (bsc#1162618).\n- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).\n- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).\n- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).\n- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).\n- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).\n- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).\n- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).\n- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).\n- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).\n- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).\n- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).\n- lib: crc64: include \u0026lt;linux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- mac80211: Fix TKIP replay protection immediately after key setup (bsc#1051510).\n- mac80211: mesh: restrict airtime metric to peered established plinks (bsc#1051510).\n- media: af9005: uninitialized variable printked (bsc#1051510).\n- media: cec: CEC 2.0-only bcast messages were ignored (git-fixes).\n- media: digitv: do not continue if remote control state can\u0027t be read (bsc#1051510).\n- media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0 (bsc#1051510).\n- media: exynos4-is: fix wrong mdev and v4l2 dev order in error path (git-fixes).\n- media: gspca: zero usb_buf (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov6650: Fix crop rectangle alignment not passed back (git-fixes).\n- media: ov6650: Fix incorrect use of JPEG colorspace (git-fixes).\n- media: pulse8-cec: fix lost cec_transmit_attempt_done() call.\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media/v4l2-core: set pages dirty upon releasing DMA buffers (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- mfd: da9062: Fix watchdog compatible string (bsc#1051510).\n- mfd: dln2: More sanity checking for endpoints (bsc#1051510).\n- mfd: rn5t618: Mark ADC control register volatile (bsc#1051510).\n- mmc: spi: Toggle SPI polarity, do not hardcode it (bsc#1051510).\n- mod_devicetable: fix PHY module format (networking-stable-19_12_28).\n- mtd: fix mtd_oobavail() incoherent returned value (bsc#1051510).\n- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1163851).\n- net: dst: Force 4-byte alignment of dst_metrics (networking-stable-19_12_28).\n- net: ena: fix napi handler misbehavior when the napi budget is zero (networking-stable-20_01_01).\n- net: hisilicon: Fix a BUG trigered by wrong bytes_compl (networking-stable-19_12_28).\n- net: nfc: nci: fix a possible sleep-in-atomic-context bug in nci_uart_tty_receive() (networking-stable-19_12_28).\n- net: qlogic: Fix error paths in ql_alloc_large_buffers() (networking-stable-19_12_28).\n- net: sched: correct flower port blocking (git-fixes).\n- net: usb: lan78xx: Fix suspend/resume PHY register access error (networking-stable-19_12_28).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- nvme: fix the parameter order for nvme_get_log in nvme_get_fw_slot_info (bsc#1163774).\n- PCI: Add DMA alias quirk for Intel VCA NTB (bsc#1051510).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI/IOV: Fix memory leak in pci_iov_add_virtfn() (git-fixes).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1114279).\n- perf/x86/intel: Fix inaccurate period in context switch for auto-reload (bsc#1164315).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- powerpc: avoid adjusting memory_limit for capture kernel memory reservation (bsc#1140025 ltc#176086).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/pseries: Advance pfn if section is not present in lmb_is_removable() (bsc#1065729).\n- powerpc/pseries: Allow not having ibm, hypertas-functions::hcall-multi-tce for DDW (bsc#1065729).\n- powerpc/pseries/hotplug-memory: Change rc variable to bool (bsc#1065729).\n- powerpc/pseries/vio: Fix iommu_table use-after-free refcount warning (bsc#1065729).\n- powerpc: reserve memory for capture kernel after hugepages init (bsc#1140025 ltc#176086).\n- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- power: supply: ltc2941-battery-gauge: fix use-after-free (bsc#1051510).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- pwm: omap-dmtimer: Remove PWM chip in .remove before making it unfunctional (git-fixes).\n- pwm: Remove set but not set variable \u0027pwm\u0027 (git-fixes).\n- pxa168fb: Fix the function used to release some memory in an error (bsc#1114279)\n- qede: Fix multicast mac configuration (networking-stable-19_12_28).\n- qmi_wwan: Add support for Quectel RM500Q (bsc#1051510).\n- quota: Check that quota is not dirty before release (bsc#1163858).\n- quota: fix livelock in dquot_writeback_dquots (bsc#1163857).\n- r8152: get default setting of WOL before initializing (bsc#1051510).\n- README.BRANCH: Update the branch name to cve/linux-4.12\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- reiserfs: Fix memory leak of journal device string (bsc#1163867).\n- reiserfs: Fix spurious unlock in reiserfs_fill_super() error handling (bsc#1163869).\n- rpm/kabi.pl: support new (\u003e=5.4) Module.symvers format (new symbol namespace field)\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- rtc: cmos: Stop using shared IRQ (bsc#1051510).\n- rtc: hym8563: Return -EINVAL if the time is known to be invalid (bsc#1051510).\n- rtlwifi: Fix MAX MPDU of VHT capability (git-fixes).\n- rtlwifi: Remove redundant semicolon in wifi.h (git-fixes).\n- scsi: qla2xxx: Fix a NULL pointer dereference in an error path (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix unbound NVME response length (bsc#1157966 bsc#1158013 bsc#1157424).\n- sctp: fully initialize v4 addr in some functions (networking-stable-19_12_28).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- soc/tegra: fuse: Correct straps\u0027 address for older Tegra124 device trees (bsc#1051510).\n- soc: ti: wkup_m3_ipc: Fix race condition with rproc_boot (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- sr_vendor: support Beurer GL50 evo CD-on-a-chip devices (boo#1164632).\n- staging: vt6656: correct packet types for CTS protect, mode (bsc#1051510).\n- staging: vt6656: Fix false Tx excessive retries reporting (bsc#1051510).\n- staging: vt6656: use NULLFUCTION stack on mac80211 (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- stop_machine: Atomically queue and wake stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption after queueing stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption when waking two stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810, bsc#1161702).\n- tcp: do not send empty skb from tcp_write_xmit() (networking-stable-20_01_01).\n- tracing: Annotate ftrace_graph_hash pointer with __rcu (git-fixes).\n- tracing: Annotate ftrace_graph_notrace_hash pointer with __rcu (git-fixes).\n- tracing: Fix tracing_stat return values in error handling paths (git-fixes).\n- tracing: Fix very unlikely race of registering two stat tracers (git-fixes).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- ubifs: do not trigger assertion on invalid no-key filename (bsc#1163850).\n- ubifs: Fix deadlock in concurrent bulk-read and writepage (bsc#1163856).\n- ubifs: Fix FS_IOC_SETFLAGS unexpectedly clearing encrypt flag (bsc#1163855).\n- ubifs: Reject unsupported ioctl flags explicitly (bsc#1163844).\n- udp: fix integer overflow while computing available space in sk_rcvbuf (networking-stable-20_01_01).\n- USB: core: fix check for duplicate endpoints (git-fixes).\n- USB: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- USB: EHCI: Do not return -EPIPE when hub is disconnected (git-fixes).\n- USB: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: legacy: set max_speed to super-speed (bsc#1051510).\n- USB: gadget: Zero ffs_io_data (bsc#1051510).\n- USB: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- usbip: Fix error path of vhci_recv_ret_submit() (git-fixes).\n- USB: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- USB: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- USB: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- USB: serial: option: add support for Quectel RM500Q in QDL mode (git-fixes).\n- USB: serial: option: add Telit ME910G1 0x110a composition (git-fixes).\n- USB: serial: option: add ZLP support for 0x1bc7/0x9010 (git-fixes).\n- usb-storage: Disable UAS on JMicron SATA enclosure (bsc#1051510).\n- USB: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- vhost/vsock: accept only packets with the right dst_cid (networking-stable-20_01_01).\n- watchdog: max77620_wdt: fix potential build errors (bsc#1051510).\n- watchdog: rn5t618_wdt: fix module aliases (bsc#1051510).\n- watchdog: wdat_wdt: fix get_timeleft call for wdat_wdt (bsc#1162557).\n- wireless: fix enabling channel 12 for custom regulatory domain (bsc#1051510).\n- wireless: wext: avoid gcc -O3 warning (bsc#1051510).\n- x86/cpu: Update cached HLE state on write to TSX_CTRL_CPUID_CLEAR (bsc#1162619).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/resctrl: Check monitoring static key in the MBM overflow handler (bsc#1114279).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free when deleting resource groups (bsc#1114279).\n- xen/balloon: Support xend-based toolstack take two (bsc#1065600).\n- xen: Enable interrupts when calling _cond_resched() (bsc#1065600).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-649,SUSE-SLE-RT-12-SP4-2020-649",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0649-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:0649-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200649-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:0649-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061840",
        "url": "https://bugzilla.suse.com/1061840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088810",
        "url": "https://bugzilla.suse.com/1088810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1105392",
        "url": "https://bugzilla.suse.com/1105392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111666",
        "url": "https://bugzilla.suse.com/1111666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112504",
        "url": "https://bugzilla.suse.com/1112504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118338",
        "url": "https://bugzilla.suse.com/1118338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1123328",
        "url": "https://bugzilla.suse.com/1123328"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133147",
        "url": "https://bugzilla.suse.com/1133147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1140025",
        "url": "https://bugzilla.suse.com/1140025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154243",
        "url": "https://bugzilla.suse.com/1154243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157424",
        "url": "https://bugzilla.suse.com/1157424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157966",
        "url": "https://bugzilla.suse.com/1157966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158013",
        "url": "https://bugzilla.suse.com/1158013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159271",
        "url": "https://bugzilla.suse.com/1159271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160218",
        "url": "https://bugzilla.suse.com/1160218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160979",
        "url": "https://bugzilla.suse.com/1160979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161360",
        "url": "https://bugzilla.suse.com/1161360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161702",
        "url": "https://bugzilla.suse.com/1161702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161907",
        "url": "https://bugzilla.suse.com/1161907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162109",
        "url": "https://bugzilla.suse.com/1162109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162139",
        "url": "https://bugzilla.suse.com/1162139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162557",
        "url": "https://bugzilla.suse.com/1162557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162617",
        "url": "https://bugzilla.suse.com/1162617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162618",
        "url": "https://bugzilla.suse.com/1162618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162619",
        "url": "https://bugzilla.suse.com/1162619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162623",
        "url": "https://bugzilla.suse.com/1162623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162943",
        "url": "https://bugzilla.suse.com/1162943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163383",
        "url": "https://bugzilla.suse.com/1163383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163384",
        "url": "https://bugzilla.suse.com/1163384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163762",
        "url": "https://bugzilla.suse.com/1163762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163774",
        "url": "https://bugzilla.suse.com/1163774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163836",
        "url": "https://bugzilla.suse.com/1163836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163840",
        "url": "https://bugzilla.suse.com/1163840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163841",
        "url": "https://bugzilla.suse.com/1163841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163842",
        "url": "https://bugzilla.suse.com/1163842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163843",
        "url": "https://bugzilla.suse.com/1163843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163844",
        "url": "https://bugzilla.suse.com/1163844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163845",
        "url": "https://bugzilla.suse.com/1163845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163846",
        "url": "https://bugzilla.suse.com/1163846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163849",
        "url": "https://bugzilla.suse.com/1163849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163850",
        "url": "https://bugzilla.suse.com/1163850"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163851",
        "url": "https://bugzilla.suse.com/1163851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163852",
        "url": "https://bugzilla.suse.com/1163852"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163853",
        "url": "https://bugzilla.suse.com/1163853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163855",
        "url": "https://bugzilla.suse.com/1163855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163856",
        "url": "https://bugzilla.suse.com/1163856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163857",
        "url": "https://bugzilla.suse.com/1163857"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163858",
        "url": "https://bugzilla.suse.com/1163858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163859",
        "url": "https://bugzilla.suse.com/1163859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163860",
        "url": "https://bugzilla.suse.com/1163860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163861",
        "url": "https://bugzilla.suse.com/1163861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163862",
        "url": "https://bugzilla.suse.com/1163862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163863",
        "url": "https://bugzilla.suse.com/1163863"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163867",
        "url": "https://bugzilla.suse.com/1163867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163869",
        "url": "https://bugzilla.suse.com/1163869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163880",
        "url": "https://bugzilla.suse.com/1163880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163971",
        "url": "https://bugzilla.suse.com/1163971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164069",
        "url": "https://bugzilla.suse.com/1164069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164098",
        "url": "https://bugzilla.suse.com/1164098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164115",
        "url": "https://bugzilla.suse.com/1164115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164314",
        "url": "https://bugzilla.suse.com/1164314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164315",
        "url": "https://bugzilla.suse.com/1164315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164388",
        "url": "https://bugzilla.suse.com/1164388"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164471",
        "url": "https://bugzilla.suse.com/1164471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164632",
        "url": "https://bugzilla.suse.com/1164632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164705",
        "url": "https://bugzilla.suse.com/1164705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164712",
        "url": "https://bugzilla.suse.com/1164712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164727",
        "url": "https://bugzilla.suse.com/1164727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164728",
        "url": "https://bugzilla.suse.com/1164728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164729",
        "url": "https://bugzilla.suse.com/1164729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164730",
        "url": "https://bugzilla.suse.com/1164730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164731",
        "url": "https://bugzilla.suse.com/1164731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164732",
        "url": "https://bugzilla.suse.com/1164732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164733",
        "url": "https://bugzilla.suse.com/1164733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164734",
        "url": "https://bugzilla.suse.com/1164734"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164735",
        "url": "https://bugzilla.suse.com/1164735"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8428 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8428/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-03-12T08:40:11Z",
      "generator": {
        "date": "2020-03-12T08:40:11Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:0649-1",
      "initial_release_date": "2020-03-12T08:40:11Z",
      "revision_history": [
        {
          "date": "2020-03-12T08:40:11Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-4.12.14-8.15.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-4.12.14-8.15.1.noarch",
                  "product_id": "kernel-devel-rt-4.12.14-8.15.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-4.12.14-8.15.1.noarch",
                "product": {
                  "name": "kernel-source-rt-4.12.14-8.15.1.noarch",
                  "product_id": "kernel-source-rt-4.12.14-8.15.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-4.12.14-8.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-4.12.14-8.15.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-4.12.14-8.15.1.x86_64",
                  "product_id": "dlm-kmp-rt-4.12.14-8.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
                  "product_id": "gfs2-kmp-rt-4.12.14-8.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-4.12.14-8.15.1.x86_64",
                "product": {
                  "name": "kernel-rt-4.12.14-8.15.1.x86_64",
                  "product_id": "kernel-rt-4.12.14-8.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-base-4.12.14-8.15.1.x86_64",
                "product": {
                  "name": "kernel-rt-base-4.12.14-8.15.1.x86_64",
                  "product_id": "kernel-rt-base-4.12.14-8.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-4.12.14-8.15.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-4.12.14-8.15.1.x86_64",
                  "product_id": "kernel-rt-devel-4.12.14-8.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-4.12.14-8.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-4.12.14-8.15.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-4.12.14-8.15.1.x86_64",
                  "product_id": "kernel-syms-rt-4.12.14-8.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-4.12.14-8.15.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-4.12.14-8.15.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Real Time 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Real Time 12 SP4",
                  "product_id": "SUSE Linux Enterprise Real Time 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-rt-4.12.14-8.15.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-rt-4.12.14-8.15.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64"
        },
        "product_reference": "dlm-kmp-rt-4.12.14-8.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-rt-4.12.14-8.15.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64"
        },
        "product_reference": "gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-rt-4.12.14-8.15.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch"
        },
        "product_reference": "kernel-devel-rt-4.12.14-8.15.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-4.12.14-8.15.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64"
        },
        "product_reference": "kernel-rt-4.12.14-8.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-base-4.12.14-8.15.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64"
        },
        "product_reference": "kernel-rt-base-4.12.14-8.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-4.12.14-8.15.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64"
        },
        "product_reference": "kernel-rt-devel-4.12.14-8.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt_debug-devel-4.12.14-8.15.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64"
        },
        "product_reference": "kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-4.12.14-8.15.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch"
        },
        "product_reference": "kernel-source-rt-4.12.14-8.15.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-rt-4.12.14-8.15.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64"
        },
        "product_reference": "kernel-syms-rt-4.12.14-8.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-rt-4.12.14-8.15.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
          "product_id": "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-rt-4.12.14-8.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-12T08:40:11Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-8428",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8428"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8428",
          "url": "https://www.suse.com/security/cve/CVE-2020-8428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162109 for CVE-2020-8428",
          "url": "https://bugzilla.suse.com/1162109"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-12T08:40:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8428"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-12T08:40:11Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch",
          "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64",
          "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.15.1.noarch",
            "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.15.1.x86_64",
            "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.15.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-12T08:40:11Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    }
  ]
}
  suse-su-2020:0558-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": " The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).\n- CVE-2020-8992: An issue was discovered in ext4_protect_reserved_inode in fs/ext4/block_validity.c that allowed attackers to cause a soft lockup via a crafted journal size (bnc#1164069).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).\n- CVE-2020-8428: There was a use-after-free bug in fs/namei.c, which allowed local users to cause a denial of service or possibly obtain sensitive information from kernel memory (bnc#1162109).\n- CVE-2020-7053: There was a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c (bnc#1160966).\n- CVE-2019-19045: A memory leak in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures (bnc#1161522).\n- CVE-2019-16994: A memory leak existed in sit_init_net() in net/ipv6/sit.c which might have caused denial of service (bnc#1161523).\n- CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures (bnc#1161518).\n- CVE-2019-14896: A heap overflow was found in the add_ie_rates() function of the Marvell Wifi Driver (bsc#1157157).\n- CVE-2019-14897: A stack overflow was found in the lbs_ibss_join_existing() function of the Marvell Wifi Driver (bsc#1157155).\n- CVE-2019-19318: Mounting a crafted btrfs image twice could have caused a use-after-free (bnc#1158026).\n- CVE-2019-19036: An issue discovered in btrfs_root_node in fs/btrfs/ctree.c allowed a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero (bnc#1157692).\n- CVE-2019-14615: An information disclosure vulnerability existed due to insufficient control flow in certain data structures for some Intel(R) Processors (bnc#1160195).\n- CVE-2019-19965: There was a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).\n- CVE-2019-19927: Fixed an out-of-bounds read access when mounting a crafted f2fs filesystem image and performing some operations, related to ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c (bnc#1160147).\n\nThe following non-security bugs were fixed:\n\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- ACPI: PM: Avoid attaching ACPI PM domain to certain devices (bsc#1051510).\n- ACPI / video: Add force_none quirk for Dell OptiPlex 9020M (bsc#1051510).\n- ACPI: video: Do not export a non working backlight interface on MSI MS-7721 boards (bsc#1051510).\n- ACPI: watchdog: Allow disabling WDAT at boot (bsc#1162557).\n- ACPI / watchdog: Fix init failure with overlapping register regions (bsc#1162557).\n- ACPI / watchdog: Set default timeout in probe (bsc#1162557).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda: Add JasperLake PCI ID and codec vid (bsc#1111666).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda - Apply sync-write workaround to old Intel platforms, too (bsc#1111666).\n- ALSA: hda: Clear RIRB status before reading WP (bsc#1111666).\n- ALSA: hda - constify and cleanup static NodeID tables (bsc#1111666).\n- ALSA: hda: constify copied structure (bsc#1111666).\n- ALSA: hda: Constify snd_kcontrol_new items (bsc#1111666).\n- ALSA: hda: Constify snd_pci_quirk tables (bsc#1111666).\n- ALSA: hda: correct kernel-doc parameter descriptions (bsc#1111666).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda: hdmi - add Tigerlake support (bsc#1111666).\n- ALSA: hda/hdmi - Clean up Intel platform-specific fixup checks (bsc#1111666).\n- ALSA: hda: hdmi - fix pin setup on Tigerlake (bsc#1111666).\n- ALSA: hda: More constifications (bsc#1111666).\n- ALSA: hda: patch_hdmi: remove warnings with empty body (bsc#1111666).\n- ALSA: hda: patch_realtek: fix empty macro usage in if block (bsc#1111666).\n- ALSA: hda/realtek - Add Bass Speaker and fixed dac for bass speaker (bsc#1111666).\n- ALSA: hda/realtek - Add Headset Mic supported for HP cPC (bsc#1111666).\n- ALSA: hda/realtek - Add new codec supported for ALCS1200A (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for the bass speaker on Lenovo Yoga X1 7th gen (bsc#1111666).\n- ALSA: hda/realtek - Apply mic mute LED quirk for Dell E7xx laptops, too (bsc#1111666).\n- ALSA: hda/realtek - Enable the bass speaker of ASUS UX431FLC (bsc#1111666).\n- ALSA: hda/realtek - Fixed one of HP ALC671 platform Headset Mic supported (bsc#1111666).\n- ALSA: hda/realtek - Fix silent output on MSI-GL73 (git-fixes).\n- ALSA: hda/realtek - More constifications (bsc#1111666).\n- ALSA: hda/realtek - Set EAPD control to default for ALC222 (bsc#1111666).\n- ALSA: hda: Reset stream if DMA RUN bit not cleared (bsc#1111666).\n- ALSA: hda: Use scnprintf() for printing texts for sysfs/procfs (git-fixes).\n- ALSA: seq: Avoid concurrent access to queue flags (git-fixes).\n- ALSA: seq: Fix concurrent access to queue current tick/time (git-fixes).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: sh: Fix unused variable warnings (bsc#1111666).\n- ALSA: usb-audio: Apply sample rate quirk for Audioengine D1 (git-fixes).\n- ALSA: usb-audio: Apply the sample rate quirk for Bose Companion 5 (bsc#1111666).\n- ALSA: usb-audio: Fix endianess in descriptor validation (bsc#1111666).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: cs4349: Use PM ops \u0027cs4349_runtime_pm\u0027 (bsc#1051510).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: samsung: i2s: Fix prescaler setting for the secondary DAI (bsc#1111666).\n- ASoC: sun8i-codec: Fix setting DAI data format (git-fixes).\n- ata: ahci: Add shutdown to freeze hardware resources of ahci (bsc#1164388).\n- ath10k: Correct the DMA direction for management tx buffers (bsc#1111666).\n- ath10k: pci: Fix comment on ath10k_pci_dump_memory_sram (bsc#1111666).\n- ath10k: pci: Only dump ATH10K_MEM_REGION_TYPE_IOREG when safe (bsc#1111666).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front() (bsc#1163762).\n- bcache: add code comments for state-\u003epool in __btree_sort() (bsc#1163762).\n- bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n- bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n- bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n- bcache: add more accurate error messages in read_super() (bsc#1163762).\n- bcache: add readahead cache policy options via sysfs interface (bsc#1163762).\n- bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (bsc#1163762).\n- bcache: check return value of prio_read() (bsc#1163762).\n- bcache: deleted code comments for dead code in bch_data_insert_keys() (bsc#1163762).\n- bcache: do not export symbols (bsc#1163762).\n- bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n- bcache: fix a lost wake-up problem caused by mca_cannibalize_lock (bsc#1163762).\n- bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n- bcache: fix deadlock in bcache_allocator (bsc#1163762).\n- bcache: fix incorrect data type usage in btree_flush_write() (bsc#1163762).\n- bcache: fix memory corruption in bch_cache_accounting_clear() (bsc#1163762).\n- bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n- bcache: ignore pending signals when creating gc and allocator thread (bsc#1163762, bsc#1112504).\n- bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n- bcache: reap c-\u003ebtree_cache_freeable from the tail in bch_mca_scan() (bsc#1163762).\n- bcache: reap from tail of c-\u003ebtree_cache in bch_mca_scan() (bsc#1163762).\n- bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n- bcache: remove member accessed from struct btree (bsc#1163762).\n- bcache: remove the extra cflags for request.o (bsc#1163762).\n- bcma: remove set but not used variable \u0027sizel\u0027 (git-fixes).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840).\n- blk-mq: make sure that line break can be printed (bsc#1164098).\n- Bluetooth: Fix race condition in hci_release_sock() (bsc#1051510).\n- bnxt: apply computed clamp value for coalece parameter (bsc#1104745).\n- bnxt_en: Fix MSIX request logic for RDMA driver (bsc#1104745 ).\n- bnxt_en: Return error if FW returns more data than dump length (bsc#1104745).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- bpf: add self-check logic to liveness analysis (bsc#1160618).\n- bpf: add verifier stats and log_level bit 2 (bsc#1160618).\n- bpf: Fix incorrect verifier simulation of ARSH under ALU32 (bsc#1083647).\n- bpf: improve stacksafe state comparison (bco#1160618).\n- bpf: improve verification speed by droping states (bsc#1160618).\n- bpf: improve verification speed by not remarking live_read (bsc#1160618).\n- bpf: improve verifier branch analysis (bsc#1160618).\n- bpf: increase complexity limit and maximum program size (bsc#1160618).\n- bpf: increase verifier log limit (bsc#1160618).\n- bpf: Reject indirect var_off stack access in raw mode (bsc#1160618).\n- bpf: Reject indirect var_off stack access in unpriv mode (bco#1160618).\n- bpf: Sanity check max value for var_off stack access (bco#1160618).\n- bpf/sockmap: Read psock ingress_msg before sk_receive_queue (bsc#1083647).\n- bpf: speed up stacksafe check (bco#1160618).\n- bpf: Support variable offset stack access from helpers (bco#1160618).\n- bpf: verifier: teach the verifier to reason about the BPF_JSET instruction (bco#1160618).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_p2p_create_p2pdev() (bsc#1111666).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- brcmfmac: sdio: Fix OOB interrupt initialization on brcm43362 (bsc#1111666).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: do not double lock the subvol_sem for rename exchange (bsc#1162943).\n- Btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- Btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- Btrfs: fix infinite loop during fsync after rename operations (bsc#1163383).\n- Btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- Btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- Btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- Btrfs: fix race between adding and putting tree mod seq elements and nodes (bsc#1163384).\n- Btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- Btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- Btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- Btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1051510).\n- cdrom: respect device capabilities during opening action (boo#1164632).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix deadlocks in autodisconnect work (bsc#1111666).\n- cfg80211: fix memory leak in cfg80211_cqm_rssi_update (bsc#1111666).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cgroup: pids: use atomic64_t for pids-\u003elimit (bsc#1161514).\n- chardev: Avoid potential use-after-free in \u0027chrdev_open()\u0027 (bsc#1163849).\n- CIFS: add support for flock (bsc#1144333).\n- CIFS: Close cached root handle only if it had a lease (bsc#1144333).\n- CIFS: Close open handle after interrupted close (bsc#1144333).\n- CIFS: close the shared root handle on tree disconnect (bsc#1144333).\n- CIFS: Do not miss cancelled OPEN responses (bsc#1144333).\n- CIFS: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- CIFS: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- CIFS: fix mount option display for sec=krb5i (bsc#1161907).\n- CIFS: Fix mount options set in automount (bsc#1144333).\n- CIFS: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- CIFS: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- CIFS: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- CIFS: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- CIFS: Properly process SMB3 lease breaks (bsc#1144333).\n- CIFS: remove set but not used variables \u0027cinode\u0027 and \u0027netfid\u0027 (bsc#1144333).\n- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: imx: clk-composite-8m: add lock to gate/mux (git-fixes).\n- clk: mmp2: Fix the order of timer mux parents (bsc#1051510).\n- clk: qcom: rcg2: Do not crash if our parent can\u0027t be found; return an error (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: sunxi-ng: add mux and pll notifiers for A64 CPU clock (bsc#1051510).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clk: tegra: Mark fuse clock as critical (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource: Prevent double add_timer_on() for watchdog_timer (bsc#1051510).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn-\u003ealg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: caam/qi2 - fix typo in algorithm\u0027s driver name (bsc#1111666).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- Documentation: Document arm64 kpti control (bsc#1162623).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drm/amd/display: Retrain dongles when SINK_COUNT becomes non-zero (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_device_set_cg_state\u0027 (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: fix ring test failure issue during s3 in vce 3.0 (V2) (bsc#1111666).\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027invalid\u0027 (bsc#1111666).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm/amdgpu/{uvd,vcn}: fetch ring\u0027s read_ptr after alloc (bsc#1111666).\n- drm/amd/powerplay: remove set but not used variable \u0027us_mvdd\u0027 (bsc#1111666).\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915: Add missing include file \u0026lt;linux/math64.h\u003e (bsc#1051510).\n- drm/i915: Call dma_set_max_seg_size() in i915_driver_hw_probe() (bsc#1111666).\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm/i915/gvt: Pin vgpu dma address before using (bsc#1112178)\n- drm/i915/gvt: set guest display buffer as readonly (bsc#1112178)\n- drm/i915/gvt: use vgpu lock for active state setting (bsc#1112178)\n- drm/i915: Handle vm_mmap error during I915_GEM_MMAP ioctl with WC set (bsc#1111666).\n- drm/i915: Make sure cdclk is high enough for DP audio on VLV/CHV (bsc#1111666).\n- drm/i915/perf: add missing delay for OA muxes configuration (bsc#1111666).\n- drm/i915: Sanity check mmap length against object size (bsc#1111666).\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable (bsc#1111666).\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/nouveau/bar/gf100: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/bar/nv50: check bar1 vmm return value (bsc#1111666).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/nouveau/mmu: qualify vmm during dtor (bsc#1111666).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/rect: Avoid division by zero (bsc#1111666).\n- drm/rect: update kerneldoc for drm_rect_clip_scaled() (bsc#1111666).\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/sun4i: hdmi: Remove duplicate cleanup calls (bsc#1113956)\n- drm/sun4i: tcon: Set min division of TCON0_DCLK to 1 (bsc#1111666).\n- drm/sun4i: tcon: Set RGB DCLK min. divider based on hardware model (bsc#1111666).\n- drm/ttm: ttm_tt_init_fields() can be static (bsc#1111666).\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- Enable CONFIG_BLK_DEV_SR_VENDOR (boo#1164632).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- ext2: check err when partial != NULL (bsc#1163859).\n- ext4: check for directory entries too close to block end (bsc#1163861).\n- ext4: fix a bug in ext4_wait_for_tail_page_commit (bsc#1163841).\n- ext4: fix checksum errors with indexed dirs (bsc#1160979).\n- ext4: fix deadlock allocating crypto bounce page from mempool (bsc#1163842).\n- ext4: Fix mount failure with quota configured as module (bsc#1164471).\n- ext4: improve explanation of a mount failure caused by a misconfigured kernel (bsc#1163843).\n- ext4, jbd2: ensure panic when aborting with zero errno (bsc#1163853).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- firestream: fix memory leaks (bsc#1051510).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- Fix the locking in dcache_readdir() and friends (bsc#1123328).\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- fscrypt: do not set policy for a dead directory (bsc#1163846).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/open.c: allow opening only regular files during execve() (bsc#1163845).\n- ftrace: Add comment to why rcu_dereference_sched() is open coded (git-fixes).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- ftrace: Protect ftrace_graph_hash with ftrace_sync (git-fixes).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- gtp: avoid zero size hashtable (networking-stable-20_01_01).\n- gtp: do not allow adding duplicate tid and ms_addr pdp context (networking-stable-20_01_01).\n- gtp: fix an use-after-free in ipv4_pdp_find() (networking-stable-20_01_01).\n- gtp: fix wrong condition in gtp_genl_dump_pdp() (networking-stable-20_01_01).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- hotplug/drc-info: Add code to search ibm,drc-info property (bsc#1157480 ltc#181028).\n- hv_netvsc: Fix offset usage in netvsc_send_table() (bsc#1164598).\n- hv_netvsc: Fix send_table offset in case of a host bug (bsc#1164598).\n- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1164598).\n- hv_netvsc: Fix unwanted rx_table reset (bsc#1164598).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (k10temp) Add support for AMD family 17h, model 70h CPUs (bsc#1163206).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- hwmon: (pmbus/ltc2978) Fix PMBus polling of MFR_COMMON definitions (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- IB/hfi1: Do not cancel unused work item (bsc#1114685 ).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- init: add arch_call_rest_init to allow stack switching (jsc#SLE-11178).\n- init: add arch_call_rest_init to allow stack switching (jsc#SLE-11179).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- iommu/amd: Fix IOMMU perf counter clobbering during init (bsc#1162617).\n- iommu/arm-smmu-v3: Populate VMID field for CMDQ_OP_TLBI_NH_VA (bsc#1164314).\n- iommu/io-pgtable-arm: Fix race handling in split_blk_unmap() (bsc#1164115).\n- iommu/iova: Init the struct iova to fix the possible memleak (bsc#1160469).\n- iommu/mediatek: Correct the flush_iotlb_all callback (bsc#1160470).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: change monitor DMA to be coherent (bsc#1161243).\n- iwlwifi: clear persistence bit according to device family (bsc#1111666).\n- iwlwifi: do not throw error when trying to remove IGTK (bsc#1051510).\n- iwlwifi: mvm: fix NVM check for 3168 devices (bsc#1051510).\n- iwlwifi: trans: Clear persistence bit when starting the FW (bsc#1111666).\n- jbd2: clear JBD2_ABORT flag before journal_reset to update log tail info when load journal (bsc#1163862).\n- jbd2: do not clear the BH_Mapped flag when forgetting a metadata buffer (bsc#1163836).\n- jbd2: Fix possible overflow in jbd2_log_space_left() (bsc#1163860).\n- jbd2: make sure ESHUTDOWN to be recorded in the journal superblock (bsc#1163863).\n- jbd2: move the clearing of b_modified flag to the journal_unmap_buffer() (bsc#1163880).\n- jbd2: switch to use jbd2_journal_abort() when failed to submit the commit record (bsc#1163852).\n- kABI fixup for alloc_dax_region (bsc#1158071,bsc#1160678).\n- kABI: protect struct sctp_ep_common (kabi).\n- kABI: Protest new fields in BPF structs (bsc#1160618).\n- kabi/severities: Whitelist rpaphp_get_drc_props (bsc#1157480 ltc#181028).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kconfig: fix broken dependency in randconfig-generated .config (bsc#1051510).\n- kernel-binary.spec.in: do not recommend firmware for kvmsmall and azure flavor (boo#1161360).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- KVM: Clean up __kvm_gfn_to_hva_cache_init() and its callers (bsc#1133021).\n- KVM: fix spectrev1 gadgets (bsc#1164705).\n- KVM: PPC: Book3S HV: Uninit vCPU if vcore creation fails (bsc#1061840).\n- KVM: PPC: Book3S PR: Fix -Werror=return-type build failure (bsc#1061840).\n- KVM: PPC: Book3S PR: Free shared page if mmu initialization fails (bsc#1061840).\n- KVM: SVM: Override default MMIO mask if memory encryption is enabled (bsc#1162618).\n- kvm: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).\n- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).\n- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).\n- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).\n- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).\n- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).\n- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).\n- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).\n- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).\n- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).\n- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).\n- lcoking/rwsem: Add missing ACQUIRE to read_slowpath sleep loop (bsc#1050549).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- lib: crc64: include \u0026lt;linux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- lib: crc64: include \u0026lt;linux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- libnvdimm: Fix devm_nsio_enable() kabi (bsc#1153535).\n- libnvdimm/namespace: Differentiate between probe mapping and runtime mapping (bsc#1153535).\n- libnvdimm/pfn: Account for PAGE_SIZE \u003e info-block-size in nd_pfn_init() (bsc#1127682 bsc#1153535 ltc#175033 ltc#181834).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- livepatch: Simplify stack trace retrieval (jsc#SLE-11179).\n- locking/rwsem: Prevent decrement of reader count before increment (bsc#1050549).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- mac80211: fix ieee80211_txq_setup_flows() failure path (bsc#1111666).\n- mac80211: Fix TKIP replay protection immediately after key setup (bsc#1051510).\n- mac80211: mesh: restrict airtime metric to peered established plinks (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- md/raid0: Fix buffer overflow at debug print (bsc#1164051).\n- media: af9005: uninitialized variable printked (bsc#1051510).\n- media: cec: CEC 2.0-only bcast messages were ignored (git-fixes).\n- media: digitv: do not continue if remote control state can\u0027t be read (bsc#1051510).\n- media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0 (bsc#1051510).\n- media: exynos4-is: fix wrong mdev and v4l2 dev order in error path (git-fixes).\n- media: gspca: zero usb_buf (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov6650: Fix crop rectangle alignment not passed back (git-fixes).\n- media: ov6650: Fix incorrect use of JPEG colorspace (git-fixes).\n- media: pulse8-cec: fix lost cec_transmit_attempt_done() call.\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media/v4l2-core: set pages dirty upon releasing DMA buffers (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- mfd: da9062: Fix watchdog compatible string (bsc#1051510).\n- mfd: dln2: More sanity checking for endpoints (bsc#1051510).\n- mfd: rn5t618: Mark ADC control register volatile (bsc#1051510).\n- mlxsw: spectrum_qdisc: Ignore grafting of invisible FIFO (bsc#1112374).\n- mmc: sdhci: Add a quirk for broken command queuing (git-fixes).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK (git-fixes).\n- mmc: spi: Toggle SPI polarity, do not hardcode it (bsc#1051510).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- mm, debug_pagealloc: do not rely on static keys too early (VM debuging functionality, bsc#1159096).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mod_devicetable: fix PHY module format (networking-stable-19_12_28).\n- mtd: fix mtd_oobavail() incoherent returned value (bsc#1051510).\n- mwifiex: delete unused mwifiex_get_intf_num() (bsc#1111666).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- mwifiex: update set_mac_address logic (bsc#1111666).\n- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1163851).\n- net: add sendmsg_locked and sendpage_locked to af_inet6 (bsc#1144162).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: dst: Force 4-byte alignment of dst_metrics (networking-stable-19_12_28).\n- net: ena: fix napi handler misbehavior when the napi budget is zero (networking-stable-20_01_01).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- net: hisilicon: Fix a BUG trigered by wrong bytes_compl (networking-stable-19_12_28).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net: nfc: nci: fix a possible sleep-in-atomic-context bug in nci_uart_tty_receive() (networking-stable-19_12_28).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: qlogic: Fix error paths in ql_alloc_large_buffers() (networking-stable-19_12_28).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net: sched: correct flower port blocking (git-fixes).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net, sysctl: Fix compiler warning when only cBPF is present (bsc#1109837).\n- net: usb: lan78xx: Fix suspend/resume PHY register access error (networking-stable-19_12_28).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- NFC: pn533: fix bulk-message timeout (bsc#1051510).\n- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- nvme: fix the parameter order for nvme_get_log in nvme_get_fw_slot_info (bsc#1163774).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- PCI: Add DMA alias quirk for Intel VCA NTB (bsc#1051510).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI/IOV: Fix memory leak in pci_iov_add_virtfn() (git-fixes).\n- PCI: rpaphp: Add drc-info support for hotplug slot registration (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Annotate and correctly byte swap DRC properties (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Avoid a sometimes-uninitialized warning (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Correctly match ibm, my-drc-index to drc-name when using drc-info (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Do not rely on firmware feature to imply drc-info support (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Fix up pointer to first drc-info entry (bsc#1157480 ltc#181028).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1114279).\n- perf/x86/intel: Fix inaccurate period in context switch for auto-reload (bsc#1164315).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctrl: cherryview: Fix irq_valid_mask calculation (bsc#1111666).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: avoid adjusting memory_limit for capture kernel memory reservation (bsc#1140025 ltc#176086).\n- powerpc: Enable support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/livepatch: return -ERRNO values in save_stack_trace_tsk_reliable() (bsc#1071995 bsc#1161875).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/papr_scm: Do not enable direct map for a region by default (bsc#1129551).\n- powerpc/papr_scm: Fix leaking \u0027bus_desc.provider_name\u0027 in some paths (bsc#1142685 ltc#179509).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/pseries: Add cpu DLPAR support for drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Advance pfn if section is not present in lmb_is_removable() (bsc#1065729).\n- powerpc/pseries: Allow not having ibm, hypertas-functions::hcall-multi-tce for DDW (bsc#1065729).\n- powerpc/pseries: Enable support for ibm,drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix bad drc_index_start value parsing of drc-info entry (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix drc-info mappings of logical cpus to drc-index (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix vector5 in ibm architecture vector table (bsc#1157480 ltc#181028).\n- powerpc/pseries/hotplug-memory: Change rc variable to bool (bsc#1065729).\n- powerpc/pseries/lparcfg: Fix display of Maximum Memory (bsc#1162028 ltc#181740).\n- powerpc/pseries: Revert support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc/pseries/vio: Fix iommu_table use-after-free refcount warning (bsc#1065729).\n- powerpc: reserve memory for capture kernel after hugepages init (bsc#1140025 ltc#176086).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- power: supply: ltc2941-battery-gauge: fix use-after-free (bsc#1051510).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- pseries/drc-info: Search DRC properties for CPU indexes (bsc#1157480 ltc#181028).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- pwm: omap-dmtimer: Remove PWM chip in .remove before making it unfunctional (git-fixes).\n- pwm: Remove set but not set variable \u0027pwm\u0027 (git-fixes).\n- pxa168fb: Fix the function used to release some memory in an error (bsc#1114279)\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qede: Fix multicast mac configuration (networking-stable-19_12_28).\n- qmi_wwan: Add support for Quectel RM500Q (bsc#1051510).\n- quota: Check that quota is not dirty before release (bsc#1163858).\n- quota: fix livelock in dquot_writeback_dquots (bsc#1163857).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- r8152: get default setting of WOL before initializing (bsc#1051510).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- reiserfs: Fix memory leak of journal device string (bsc#1163867).\n- reiserfs: Fix spurious unlock in reiserfs_fill_super() error handling (bsc#1163869).\n- rpm/kabi.pl: support new (\u003e=5.4) Module.symvers format (new symbol namespace field)\n- rpm/kernel-binary.spec.in: Conflict with too old powerpc-utils (jsc#ECO-920, jsc#SLE-11054, jsc#SLE-11322).\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- rsi_91x_usb: fix interface sanity check (git-fixes).\n- rtc: cmos: Stop using shared IRQ (bsc#1051510).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: hym8563: Return -EINVAL if the time is known to be invalid (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in \u0027max8997_rtc_read_alarm()\u0027 (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf\u0027s type to u8 in s35390a_init (bsc#1051510).\n- rtl8xxxu: fix interface sanity check (git-fixes).\n- rtlwifi: Fix MAX MPDU of VHT capability (git-fixes).\n- rtlwifi: Remove redundant semicolon in wifi.h (git-fixes).\n- s390: add stack switch helper (jsc#SLE-11179).\n- s390: add support for virtually mapped kernel stacks (jsc#SLE-11179).\n- s390: always inline current_stack_pointer() (jsc#SLE-11179).\n- s390: always inline disabled_wait (jsc#SLE-11179).\n- s390: avoid misusing CALL_ON_STACK for task stack setup (jsc#SLE-11179).\n- s390: clean up stacks setup (jsc#SLE-11179).\n- s390: correct CALL_ON_STACK back_chain saving (jsc#SLE-11179).\n- s390: disable preemption when switching to nodat stack with CALL_ON_STACK (jsc#SLE-11179).\n- s390: fine-tune stack switch helper (jsc#SLE-11179).\n- s390: fix register clobbering in CALL_ON_STACK (jsc#SLE-11179).\n- s390/ftrace: generate traced function stack frame (jsc#SLE-11178 jsc#SLE-11179).\n- s390/ftrace: save traced function caller (jsc#SLE-11179).\n- s390/ftrace: use HAVE_FUNCTION_GRAPH_RET_ADDR_PTR (jsc#SLE-11179).\n- s390/head64: correct init_task stack setup (jsc#SLE-11179).\n- s390: kabi workaround for ftrace_ret_stack (jsc#SLE-11179).\n- s390: kabi workaround for lowcore changes due to vmap stack (jsc#SLE-11179).\n- s390: kabi workaround for reliable stack tracing (jsc#SLE-11179).\n- s390/kasan: avoid false positives during stack unwind (jsc#SLE-11179).\n- s390/kasan: avoid report in get_wchan (jsc#SLE-11179).\n- s390/livepatch: Implement reliable stack tracing for the consistency model (jsc#SLE-11179).\n- s390: preserve kabi for stack unwind API (jsc#SLE-11179).\n- s390/process: avoid custom stack unwinding in get_wchan (jsc#SLE-11179).\n- s390/stacktrace: use common arch_stack_walk infrastructure (jsc#SLE-11179).\n- s390/suspend: fix stack setup in swsusp_arch_suspend (jsc#SLE-11179).\n- s390/test_unwind: print verbose unwinding results (jsc#SLE-11179).\n- s390: unify stack size definitions (jsc#SLE-11179).\n- s390/unwind: add stack pointer alignment sanity checks (jsc#SLE-11179).\n- s390/unwind: always inline get_stack_pointer (jsc#SLE-11179).\n- s390/unwind: avoid int overflow in outside_of_stack (jsc#SLE-11179).\n- s390/unwind: cleanup unused READ_ONCE_TASK_STACK (jsc#SLE-11179).\n- s390/unwind: correct stack switching during unwind (jsc#SLE-11179).\n- s390/unwind: drop unnecessary code around calling ftrace_graph_ret_addr() (jsc#SLE-11179).\n- s390/unwind: filter out unreliable bogus %r14 (jsc#SLE-11179).\n- s390/unwind: fix get_stack_pointer(NULL, NULL) (jsc#SLE-11179).\n- s390/unwind: fix mixing regs and sp (jsc#SLE-11179).\n- s390/unwind: introduce stack unwind API (jsc#SLE-11179).\n- s390/unwind: make reuse_sp default when unwinding pt_regs (jsc#SLE-11179).\n- s390/unwind: remove stack recursion warning (jsc#SLE-11179).\n- s390/unwind: report an error if pt_regs are not on stack (jsc#SLE-11179).\n- s390/unwind: start unwinding from reliable state (jsc#SLE-11179).\n- s390/unwind: stop gracefully at task pt_regs (jsc#SLE-11179).\n- s390/unwind: stop gracefully at user mode pt_regs in irq stack (jsc#SLE-11179).\n- s390/unwind: unify task is current checks (jsc#SLE-11179).\n- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1154601).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Fix a NULL pointer dereference in an error path (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix unbound NVME response length (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- sctp: fully initialize v4 addr in some functions (networking-stable-19_12_28).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- sfc: Remove \u0027PCIE error reporting unavailable\u0027 (bsc#1161472).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- SMB3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- SMB3: Fix persistent handles reconnect (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: remove confusing dmesg when mounting with encryption (\u0027seal\u0027) (bsc#1144333).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- soc/tegra: fuse: Correct straps\u0027 address for older Tegra124 device trees (bsc#1051510).\n- soc: ti: wkup_m3_ipc: Fix race condition with rproc_boot (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- sr_vendor: support Beurer GL50 evo CD-on-a-chip devices (boo#1164632).\n- stacktrace: Do not skip first entry on noncurrent tasks (jsc#SLE-11178).\n- stacktrace: Force USER_DS for stack_trace_save_user() (jsc#SLE-11179).\n- stacktrace: Get rid of unneeded \u0027!!\u0027 pattern (jsc#SLE-11179).\n- stacktrace: Provide common infrastructure (jsc#SLE-11179).\n- stacktrace: Provide helpers for common stack trace operations (jsc#SLE-11179).\n- stacktrace: Unbreak stack_trace_save_tsk_reliable() (jsc#SLE-11179).\n- stacktrace: Use PF_KTHREAD to check for kernel threads (jsc#SLE-11179).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- Staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: vt6656: correct packet types for CTS protect, mode (bsc#1051510).\n- staging: vt6656: Fix false Tx excessive retries reporting (bsc#1051510).\n- staging: vt6656: use NULLFUCTION stack on mac80211 (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- stop_machine: Atomically queue and wake stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption after queueing stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption when waking two stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810, bsc#1161702).\n- swiotlb: do not panic on mapping failures (bsc#1162171).\n- swiotlb: remove the overflow buffer (bsc#1162171).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1160560).\n- tcp: do not send empty skb from tcp_write_xmit() (networking-stable-20_01_01).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- Temporary workaround for bsc#1159096 should no longer be needed.\n- tracing: Annotate ftrace_graph_hash pointer with __rcu (git-fixes).\n- tracing: Annotate ftrace_graph_notrace_hash pointer with __rcu (git-fixes).\n- tracing: Cleanup stack trace code (jsc#SLE-11179).\n- tracing: Fix very unlikely race of registering two stat tracers (git-fixes).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- ubifs: do not trigger assertion on invalid no-key filename (bsc#1163850).\n- ubifs: Fix deadlock in concurrent bulk-read and writepage (bsc#1163856).\n- ubifs: Fix FS_IOC_SETFLAGS unexpectedly clearing encrypt flag (bsc#1163855).\n- ubifs: Reject unsupported ioctl flags explicitly (bsc#1163844).\n- udp: fix integer overflow while computing available space in sk_rcvbuf (networking-stable-20_01_01).\n- USB: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- USB: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- USB: core: fix check for duplicate endpoints (git-fixes).\n- USB: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- USB: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- USB: EHCI: Do not return -EPIPE when hub is disconnected (git-fixes).\n- USB: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: legacy: set max_speed to super-speed (bsc#1051510).\n- USB: gadget: Zero ffs_io_data (bsc#1051510).\n- USB: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- USBip: Fix error path of vhci_recv_ret_submit() (git-fixes).\n- USB: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- USB: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- USB: roles: fix a potential use after free (git-fixes).\n- USB: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- USB: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- USB: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- USB: serial: io_edgeport: use irqsave() in USB\u0027s complete callback (bsc#1051510).\n- USB: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- USB: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- USB: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- USB: serial: keyspan: handle unbound ports (bsc#1051510).\n- USB: serial: opticon: fix control-message timeouts (bsc#1051510).\n- USB: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- USB: serial: option: add support for Quectel RM500Q in QDL mode (git-fixes).\n- USB: serial: option: add Telit ME910G1 0x110a composition (git-fixes).\n- USB: serial: option: add ZLP support for 0x1bc7/0x9010 (git-fixes).\n- USB: serial: quatech2: handle unbound ports (bsc#1051510).\n- USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- USB: serial: suppress driver bind attributes (bsc#1051510).\n- usb-storage: Disable UAS on JMicron SATA enclosure (bsc#1051510).\n- USB: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- vhost/vsock: accept only packets with the right dst_cid (networking-stable-20_01_01).\n- virtio_ring: fix unmap of indirect descriptors (bsc#1162171).\n- watchdog: max77620_wdt: fix potential build errors (bsc#1051510).\n- watchdog: rn5t618_wdt: fix module aliases (bsc#1051510).\n- watchdog: wdat_wdt: fix get_timeleft call for wdat_wdt (bsc#1162557).\n- wireless: fix enabling channel 12 for custom regulatory domain (bsc#1051510).\n- wireless: wext: avoid gcc -O3 warning (bsc#1051510).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 70h (bsc#1163206).\n- x86/cpu: Update cached HLE state on write to TSX_CTRL_CPUID_CLEAR (bsc#1162619).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/MCE/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/MCE: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/resctrl: Check monitoring static key in the MBM overflow handler (bsc#1114279).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free when deleting resource groups (bsc#1114279).\n- x86/resctrl: Prevent possible overrun during bitmap operations (bsc#1114648).\n- xen/balloon: Support xend-based toolstack take two (bsc#1065600).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xen: Enable interrupts when calling _cond_resched() (bsc#1065600).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-558,SUSE-SLE-SERVER-12-SP5-2020-558",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0558-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:0558-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200558-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:0558-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050244",
        "url": "https://bugzilla.suse.com/1050244"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050549",
        "url": "https://bugzilla.suse.com/1050549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051858",
        "url": "https://bugzilla.suse.com/1051858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061840",
        "url": "https://bugzilla.suse.com/1061840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1083647",
        "url": "https://bugzilla.suse.com/1083647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085030",
        "url": "https://bugzilla.suse.com/1085030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086301",
        "url": "https://bugzilla.suse.com/1086301"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086313",
        "url": "https://bugzilla.suse.com/1086313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086314",
        "url": "https://bugzilla.suse.com/1086314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088810",
        "url": "https://bugzilla.suse.com/1088810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104745",
        "url": "https://bugzilla.suse.com/1104745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1105392",
        "url": "https://bugzilla.suse.com/1105392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1109837",
        "url": "https://bugzilla.suse.com/1109837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111666",
        "url": "https://bugzilla.suse.com/1111666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112374",
        "url": "https://bugzilla.suse.com/1112374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112504",
        "url": "https://bugzilla.suse.com/1112504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113956",
        "url": "https://bugzilla.suse.com/1113956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114648",
        "url": "https://bugzilla.suse.com/1114648"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114685",
        "url": "https://bugzilla.suse.com/1114685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118338",
        "url": "https://bugzilla.suse.com/1118338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1123328",
        "url": "https://bugzilla.suse.com/1123328"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127682",
        "url": "https://bugzilla.suse.com/1127682"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129551",
        "url": "https://bugzilla.suse.com/1129551"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133147",
        "url": "https://bugzilla.suse.com/1133147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1140025",
        "url": "https://bugzilla.suse.com/1140025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1142685",
        "url": "https://bugzilla.suse.com/1142685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144162",
        "url": "https://bugzilla.suse.com/1144162"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144333",
        "url": "https://bugzilla.suse.com/1144333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151927",
        "url": "https://bugzilla.suse.com/1151927"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153535",
        "url": "https://bugzilla.suse.com/1153535"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153917",
        "url": "https://bugzilla.suse.com/1153917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154243",
        "url": "https://bugzilla.suse.com/1154243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154601",
        "url": "https://bugzilla.suse.com/1154601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156609",
        "url": "https://bugzilla.suse.com/1156609"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157155",
        "url": "https://bugzilla.suse.com/1157155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157157",
        "url": "https://bugzilla.suse.com/1157157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157424",
        "url": "https://bugzilla.suse.com/1157424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157480",
        "url": "https://bugzilla.suse.com/1157480"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157692",
        "url": "https://bugzilla.suse.com/1157692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157966",
        "url": "https://bugzilla.suse.com/1157966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158013",
        "url": "https://bugzilla.suse.com/1158013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158026",
        "url": "https://bugzilla.suse.com/1158026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158071",
        "url": "https://bugzilla.suse.com/1158071"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159028",
        "url": "https://bugzilla.suse.com/1159028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159096",
        "url": "https://bugzilla.suse.com/1159096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159271",
        "url": "https://bugzilla.suse.com/1159271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159377",
        "url": "https://bugzilla.suse.com/1159377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159394",
        "url": "https://bugzilla.suse.com/1159394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159588",
        "url": "https://bugzilla.suse.com/1159588"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159911",
        "url": "https://bugzilla.suse.com/1159911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159955",
        "url": "https://bugzilla.suse.com/1159955"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160147",
        "url": "https://bugzilla.suse.com/1160147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160195",
        "url": "https://bugzilla.suse.com/1160195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160210",
        "url": "https://bugzilla.suse.com/1160210"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160211",
        "url": "https://bugzilla.suse.com/1160211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160218",
        "url": "https://bugzilla.suse.com/1160218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160433",
        "url": "https://bugzilla.suse.com/1160433"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160442",
        "url": "https://bugzilla.suse.com/1160442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160469",
        "url": "https://bugzilla.suse.com/1160469"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160470",
        "url": "https://bugzilla.suse.com/1160470"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160476",
        "url": "https://bugzilla.suse.com/1160476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160560",
        "url": "https://bugzilla.suse.com/1160560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160618",
        "url": "https://bugzilla.suse.com/1160618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160678",
        "url": "https://bugzilla.suse.com/1160678"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160755",
        "url": "https://bugzilla.suse.com/1160755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160756",
        "url": "https://bugzilla.suse.com/1160756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160784",
        "url": "https://bugzilla.suse.com/1160784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160787",
        "url": "https://bugzilla.suse.com/1160787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160802",
        "url": "https://bugzilla.suse.com/1160802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160803",
        "url": "https://bugzilla.suse.com/1160803"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160804",
        "url": "https://bugzilla.suse.com/1160804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160917",
        "url": "https://bugzilla.suse.com/1160917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160966",
        "url": "https://bugzilla.suse.com/1160966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160979",
        "url": "https://bugzilla.suse.com/1160979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161087",
        "url": "https://bugzilla.suse.com/1161087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161243",
        "url": "https://bugzilla.suse.com/1161243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161360",
        "url": "https://bugzilla.suse.com/1161360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161472",
        "url": "https://bugzilla.suse.com/1161472"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161514",
        "url": "https://bugzilla.suse.com/1161514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161518",
        "url": "https://bugzilla.suse.com/1161518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161522",
        "url": "https://bugzilla.suse.com/1161522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161523",
        "url": "https://bugzilla.suse.com/1161523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161549",
        "url": "https://bugzilla.suse.com/1161549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161552",
        "url": "https://bugzilla.suse.com/1161552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161674",
        "url": "https://bugzilla.suse.com/1161674"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161702",
        "url": "https://bugzilla.suse.com/1161702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161875",
        "url": "https://bugzilla.suse.com/1161875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161907",
        "url": "https://bugzilla.suse.com/1161907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161931",
        "url": "https://bugzilla.suse.com/1161931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161933",
        "url": "https://bugzilla.suse.com/1161933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161934",
        "url": "https://bugzilla.suse.com/1161934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161935",
        "url": "https://bugzilla.suse.com/1161935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161936",
        "url": "https://bugzilla.suse.com/1161936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161937",
        "url": "https://bugzilla.suse.com/1161937"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162028",
        "url": "https://bugzilla.suse.com/1162028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162067",
        "url": "https://bugzilla.suse.com/1162067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162109",
        "url": "https://bugzilla.suse.com/1162109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162139",
        "url": "https://bugzilla.suse.com/1162139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162171",
        "url": "https://bugzilla.suse.com/1162171"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162557",
        "url": "https://bugzilla.suse.com/1162557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162617",
        "url": "https://bugzilla.suse.com/1162617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162618",
        "url": "https://bugzilla.suse.com/1162618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162619",
        "url": "https://bugzilla.suse.com/1162619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162623",
        "url": "https://bugzilla.suse.com/1162623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162943",
        "url": "https://bugzilla.suse.com/1162943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163206",
        "url": "https://bugzilla.suse.com/1163206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163383",
        "url": "https://bugzilla.suse.com/1163383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163384",
        "url": "https://bugzilla.suse.com/1163384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163762",
        "url": "https://bugzilla.suse.com/1163762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163774",
        "url": "https://bugzilla.suse.com/1163774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163836",
        "url": "https://bugzilla.suse.com/1163836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163840",
        "url": "https://bugzilla.suse.com/1163840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163841",
        "url": "https://bugzilla.suse.com/1163841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163842",
        "url": "https://bugzilla.suse.com/1163842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163843",
        "url": "https://bugzilla.suse.com/1163843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163844",
        "url": "https://bugzilla.suse.com/1163844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163845",
        "url": "https://bugzilla.suse.com/1163845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163846",
        "url": "https://bugzilla.suse.com/1163846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163849",
        "url": "https://bugzilla.suse.com/1163849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163850",
        "url": "https://bugzilla.suse.com/1163850"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163851",
        "url": "https://bugzilla.suse.com/1163851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163852",
        "url": "https://bugzilla.suse.com/1163852"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163853",
        "url": "https://bugzilla.suse.com/1163853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163855",
        "url": "https://bugzilla.suse.com/1163855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163856",
        "url": "https://bugzilla.suse.com/1163856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163857",
        "url": "https://bugzilla.suse.com/1163857"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163858",
        "url": "https://bugzilla.suse.com/1163858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163859",
        "url": "https://bugzilla.suse.com/1163859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163860",
        "url": "https://bugzilla.suse.com/1163860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163861",
        "url": "https://bugzilla.suse.com/1163861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163862",
        "url": "https://bugzilla.suse.com/1163862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163863",
        "url": "https://bugzilla.suse.com/1163863"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163867",
        "url": "https://bugzilla.suse.com/1163867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163869",
        "url": "https://bugzilla.suse.com/1163869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163880",
        "url": "https://bugzilla.suse.com/1163880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163971",
        "url": "https://bugzilla.suse.com/1163971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164051",
        "url": "https://bugzilla.suse.com/1164051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164069",
        "url": "https://bugzilla.suse.com/1164069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164098",
        "url": "https://bugzilla.suse.com/1164098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164115",
        "url": "https://bugzilla.suse.com/1164115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164314",
        "url": "https://bugzilla.suse.com/1164314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164315",
        "url": "https://bugzilla.suse.com/1164315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164388",
        "url": "https://bugzilla.suse.com/1164388"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164471",
        "url": "https://bugzilla.suse.com/1164471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164598",
        "url": "https://bugzilla.suse.com/1164598"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164632",
        "url": "https://bugzilla.suse.com/1164632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164705",
        "url": "https://bugzilla.suse.com/1164705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164712",
        "url": "https://bugzilla.suse.com/1164712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164727",
        "url": "https://bugzilla.suse.com/1164727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164728",
        "url": "https://bugzilla.suse.com/1164728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164729",
        "url": "https://bugzilla.suse.com/1164729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164730",
        "url": "https://bugzilla.suse.com/1164730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164731",
        "url": "https://bugzilla.suse.com/1164731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164732",
        "url": "https://bugzilla.suse.com/1164732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164733",
        "url": "https://bugzilla.suse.com/1164733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164734",
        "url": "https://bugzilla.suse.com/1164734"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164735",
        "url": "https://bugzilla.suse.com/1164735"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14615 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14897 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16994 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16994/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19036 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19045 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19318 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19318/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19927 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19927/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19965 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-7053 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-7053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8428 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8428/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-03-02T13:24:48Z",
      "generator": {
        "date": "2020-03-02T13:24:48Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:0558-1",
      "initial_release_date": "2020-03-02T13:24:48Z",
      "revision_history": [
        {
          "date": "2020-03-02T13:24:48Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-4.12.14-16.10.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-4.12.14-16.10.1.noarch",
                  "product_id": "kernel-devel-azure-4.12.14-16.10.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-4.12.14-16.10.1.noarch",
                "product": {
                  "name": "kernel-source-azure-4.12.14-16.10.1.noarch",
                  "product_id": "kernel-source-azure-4.12.14-16.10.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-4.12.14-16.10.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-4.12.14-16.10.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-4.12.14-16.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-4.12.14-16.10.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-4.12.14-16.10.1.x86_64",
                  "product_id": "dlm-kmp-azure-4.12.14-16.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-4.12.14-16.10.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-4.12.14-16.10.1.x86_64",
                  "product_id": "gfs2-kmp-azure-4.12.14-16.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-4.12.14-16.10.1.x86_64",
                "product": {
                  "name": "kernel-azure-4.12.14-16.10.1.x86_64",
                  "product_id": "kernel-azure-4.12.14-16.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-base-4.12.14-16.10.1.x86_64",
                "product": {
                  "name": "kernel-azure-base-4.12.14-16.10.1.x86_64",
                  "product_id": "kernel-azure-base-4.12.14-16.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-4.12.14-16.10.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-4.12.14-16.10.1.x86_64",
                  "product_id": "kernel-azure-devel-4.12.14-16.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-4.12.14-16.10.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-4.12.14-16.10.1.x86_64",
                  "product_id": "kernel-azure-extra-4.12.14-16.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-kgraft-devel-4.12.14-16.10.1.x86_64",
                "product": {
                  "name": "kernel-azure-kgraft-devel-4.12.14-16.10.1.x86_64",
                  "product_id": "kernel-azure-kgraft-devel-4.12.14-16.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-4.12.14-16.10.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-4.12.14-16.10.1.x86_64",
                  "product_id": "kernel-syms-azure-4.12.14-16.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-4.12.14-16.10.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-4.12.14-16.10.1.x86_64",
                  "product_id": "kselftests-kmp-azure-4.12.14-16.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-4.12.14-16.10.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-4.12.14-16.10.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-4.12.14-16.10.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-4.12.14-16.10.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64"
        },
        "product_reference": "kernel-azure-4.12.14-16.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-base-4.12.14-16.10.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64"
        },
        "product_reference": "kernel-azure-base-4.12.14-16.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-4.12.14-16.10.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-4.12.14-16.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-4.12.14-16.10.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch"
        },
        "product_reference": "kernel-devel-azure-4.12.14-16.10.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-4.12.14-16.10.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch"
        },
        "product_reference": "kernel-source-azure-4.12.14-16.10.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-4.12.14-16.10.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-4.12.14-16.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-4.12.14-16.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64"
        },
        "product_reference": "kernel-azure-4.12.14-16.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-base-4.12.14-16.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64"
        },
        "product_reference": "kernel-azure-base-4.12.14-16.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-4.12.14-16.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-4.12.14-16.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-4.12.14-16.10.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch"
        },
        "product_reference": "kernel-devel-azure-4.12.14-16.10.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-4.12.14-16.10.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch"
        },
        "product_reference": "kernel-source-azure-4.12.14-16.10.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-4.12.14-16.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-4.12.14-16.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-14615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14615",
          "url": "https://www.suse.com/security/cve/CVE-2019-14615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160195 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1160195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165881 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1165881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14615"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-14897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14897",
          "url": "https://www.suse.com/security/cve/CVE-2019-14897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157155 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1157155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160467 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14897"
    },
    {
      "cve": "CVE-2019-16994",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16994"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16994",
          "url": "https://www.suse.com/security/cve/CVE-2019-16994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161523 for CVE-2019-16994",
          "url": "https://bugzilla.suse.com/1161523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16994"
    },
    {
      "cve": "CVE-2019-19036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19036",
          "url": "https://www.suse.com/security/cve/CVE-2019-19036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157692 for CVE-2019-19036",
          "url": "https://bugzilla.suse.com/1157692"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19036"
    },
    {
      "cve": "CVE-2019-19045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19045",
          "url": "https://www.suse.com/security/cve/CVE-2019-19045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161522 for CVE-2019-19045",
          "url": "https://bugzilla.suse.com/1161522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19045"
    },
    {
      "cve": "CVE-2019-19054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19054",
          "url": "https://www.suse.com/security/cve/CVE-2019-19054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161518 for CVE-2019-19054",
          "url": "https://bugzilla.suse.com/1161518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19054"
    },
    {
      "cve": "CVE-2019-19318",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19318"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19318",
          "url": "https://www.suse.com/security/cve/CVE-2019-19318"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158026 for CVE-2019-19318",
          "url": "https://bugzilla.suse.com/1158026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19318"
    },
    {
      "cve": "CVE-2019-19927",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19927"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19927",
          "url": "https://www.suse.com/security/cve/CVE-2019-19927"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160147 for CVE-2019-19927",
          "url": "https://bugzilla.suse.com/1160147"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19927"
    },
    {
      "cve": "CVE-2019-19965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19965",
          "url": "https://www.suse.com/security/cve/CVE-2019-19965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159911 for CVE-2019-19965",
          "url": "https://bugzilla.suse.com/1159911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19965"
    },
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-7053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-7053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-7053",
          "url": "https://www.suse.com/security/cve/CVE-2020-7053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160966 for CVE-2020-7053",
          "url": "https://bugzilla.suse.com/1160966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-7053"
    },
    {
      "cve": "CVE-2020-8428",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8428"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8428",
          "url": "https://www.suse.com/security/cve/CVE-2020-8428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162109 for CVE-2020-8428",
          "url": "https://bugzilla.suse.com/1162109"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8428"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T13:24:48Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    }
  ]
}
  suse-su-2020:0560-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-8992: An issue was discovered in ext4_protect_reserved_inode in fs/ext4/block_validity.c that allowed attackers to cause a soft lockup via a crafted journal size (bnc#1164069).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c. It did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107).\n- CVE-2020-8428: There was a use-after-free bug in fs/namei.c, which allowed local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9 (bnc#1162109).\n- CVE-2019-19045: A memory leak in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7 (bnc#1161522).\n- CVE-2019-16994: A memory leak existed in sit_init_net() in net/ipv6/sit.c which might have caused denial of service, aka CID-07f12b26e21a (bnc#1161523).\n- CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b (bnc#1161518).\n- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).\n- CVE-2019-14897: A stack-based buffer overflow was found in the Marvell WiFi driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).\n- CVE-2020-7053: There was a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c (bnc#1160966).\n- CVE-2019-19318: Mounting a crafted btrfs image twice could have caused a use-after-free (bnc#1158026).\n- CVE-2019-19036: An issue discovered in btrfs_root_node in fs/btrfs/ctree.c allowed a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero (bnc#1157692).\n- CVE-2019-14615: An information disclosure vulnerability existed due to insufficient control flow in certain data structures for some Intel(R) Processors (bnc#1160195).\n- CVE-2019-19965: There was a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5 (bnc#1159911).\n- CVE-2019-19927: A slab-out-of-bounds read access could have been caused when mounting a crafted f2fs filesystem image and performing some operations on it, in drivers/gpu/drm/ttm/ttm_page_alloc.c (bnc#1160147).\n- CVE-2019-20095: Several memory leaks were found in drivers/net/wireless/marvell/mwifiex/cfg80211.c, aka CID-003b686ace82 (bnc#1159909).\n- CVE-2019-20054: There was a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e (bnc#1159910).\n- CVE-2019-20096: There was a memory leak in __feat_register_sp() in net/dccp/feat.c, aka CID-1d3ff0950e2b (bnc#1159908).\n- CVE-2019-19966: There was a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that could have caused a denial of service, aka CID-dea37a972655 (bnc#1159841).\n- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting could have led to a use-after-free in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19319: A slab-out-of-bounds write access could have occured when setxattr was called after mounting of a specially crafted ext4 image (bnc#1158021).\n- CVE-2019-19767: There were multiple use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163 (bnc#1159297).\n- CVE-2019-18808: A memory leak in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption), aka CID-128c66429247 (bnc#1156259).\n- CVE-2019-19066: A memory leak in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service (memory consumption), aka CID-0e62395da2bd (bnc#1157303).\n- CVE-2019-19051: A memory leak in drivers/net/wimax/i2400m/op-rfkill.c allowed attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7 (bnc#1159024).\n- CVE-2019-19338: There was an incomplete fix for an issue with Transactional Synchronisation Extensions in the KVM code (bsc#1158954).\n- CVE-2019-19332: An out-of-bounds memory write issue was found in the way the KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could have used this flaw to crash the system (bnc#1158827).\n- CVE-2019-19537: There was a race condition bug that could be caused by a malicious USB character device, aka CID-303911cfc5b9. (bsc#1158904).\n- CVE-2019-19535: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042 (bsc#1158903).\n- CVE-2019-19527: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e (bsc#1158900).\n- CVE-2019-19526: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098 (bsc#1158893).\n- CVE-2019-19533: There was an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464 (bsc#1158834).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that can be caused by a malicious USB HID device, aka CID-d9d4b1e46d95 (bsc#1158824).\n- CVE-2019-19523: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bsc#1158823).\n- CVE-2019-15213: A use-after-free bug caused by a malicious USB device was found in drivers/media/usb/dvb-usb/dvb-usb-init.c (bsc#1146544).\n- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).\n\n\nThe following non-security bugs were fixed:\n\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).\n- ACPI / video: Add force_none quirk for Dell OptiPlex 9020M (bsc#1051510).\n- ACPI / watchdog: Fix init failure with overlapping register regions (bsc#1162557).\n- ACPI / watchdog: Set default timeout in probe (bsc#1162557).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- ACPI: OSL: only free map once in osl.c (bsc#1051510).\n- ACPI: PM: Avoid attaching ACPI PM domain to certain devices (bsc#1051510).\n- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).\n- ACPI: video: Do not export a non working backlight interface on MSI MS-7721 boards (bsc#1051510).\n- ACPI: watchdog: Allow disabling WDAT at boot (bsc#1162557).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).\n- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda - Apply sync-write workaround to old Intel platforms, too (bsc#1111666).\n- ALSA: hda - constify and cleanup static NodeID tables (bsc#1111666).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda - fixup for the bass speaker on Lenovo Carbon X1 7th gen (git-fixes).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda/hdmi - Clean up Intel platform-specific fixup checks (bsc#1111666).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).\n- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).\n- ALSA: hda/realtek - Add Bass Speaker and fixed dac for bass speaker (bsc#1111666).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: hda/realtek - Add Headset Mic supported for HP cPC (bsc#1111666).\n- ALSA: hda/realtek - Add new codec supported for ALCS1200A (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for the bass speaker on Lenovo Yoga X1 7th gen (bsc#1111666).\n- ALSA: hda/realtek - Apply mic mute LED quirk for Dell E7xx laptops, too (bsc#1111666).\n- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).\n- ALSA: hda/realtek - Enable the bass speaker of ASUS UX431FLC (bsc#1111666).\n- ALSA: hda/realtek - Fix inverted bass GPIO pin on Acer 8951G (git-fixes).\n- ALSA: hda/realtek - Fix silent output on MSI-GL73 (git-fixes).\n- ALSA: hda/realtek - Fixed one of HP ALC671 platform Headset Mic supported (bsc#1111666).\n- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).\n- ALSA: hda/realtek - More constifications (bsc#1111666).\n- ALSA: hda/realtek - Set EAPD control to default for ALC222 (bsc#1111666).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: hda: Add JasperLake PCI ID and codec vid (bsc#1111666).\n- ALSA: hda: Clear RIRB status before reading WP (bsc#1111666).\n- ALSA: hda: constify copied structure (bsc#1111666).\n- ALSA: hda: Constify snd_kcontrol_new items (bsc#1111666).\n- ALSA: hda: Constify snd_pci_quirk tables (bsc#1111666).\n- ALSA: hda: correct kernel-doc parameter descriptions (bsc#1111666).\n- ALSA: hda: hdmi - add Tigerlake support (bsc#1111666).\n- ALSA: hda: hdmi - fix pin setup on Tigerlake (bsc#1111666).\n- ALSA: hda: More constifications (bsc#1111666).\n- ALSA: hda: patch_hdmi: remove warnings with empty body (bsc#1111666).\n- ALSA: hda: patch_realtek: fix empty macro usage in if block (bsc#1111666).\n- ALSA: hda: Reset stream if DMA RUN bit not cleared (bsc#1111666).\n- ALSA: hda: Use scnprintf() for printing texts for sysfs/procfs (git-fixes).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).\n- ALSA: seq: Avoid concurrent access to queue flags (git-fixes).\n- ALSA: seq: Fix concurrent access to queue current tick/time (git-fixes).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: sh: Fix unused variable warnings (bsc#1111666).\n- ALSA: usb-audio: Apply sample rate quirk for Audioengine D1 (git-fixes).\n- ALSA: usb-audio: Apply the sample rate quirk for Bose Companion 5 (bsc#1111666).\n- ALSA: usb-audio: Fix endianess in descriptor validation (bsc#1111666).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- apparmor: fix unsigned len comparison with less than zero (git-fixes).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).\n- ASoC: cs4349: Use PM ops \u0027cs4349_runtime_pm\u0027 (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: samsung: i2s: Fix prescaler setting for the secondary DAI (bsc#1111666).\n- ASoC: sun8i-codec: Fix setting DAI data format (git-fixes).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ata: ahci: Add shutdown to freeze hardware resources of ahci (bsc#1164388).\n- ath10k: Correct the DMA direction for management tx buffers (bsc#1111666).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath10k: pci: Fix comment on ath10k_pci_dump_memory_sram (bsc#1111666).\n- ath10k: pci: Only dump ATH10K_MEM_REGION_TYPE_IOREG when safe (bsc#1111666).\n- ath6kl: Fix off by one error in scan completion (bsc#1051510).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).\n- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front() (bsc#1163762).\n- bcache: add code comments for state-\u003epool in __btree_sort() (bsc#1163762).\n- bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n- bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n- bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n- bcache: add more accurate error messages in read_super() (bsc#1163762).\n- bcache: add readahead cache policy options via sysfs interface (bsc#1163762).\n- bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (bsc#1163762).\n- bcache: check return value of prio_read() (bsc#1163762).\n- bcache: deleted code comments for dead code in bch_data_insert_keys() (bsc#1163762).\n- bcache: do not export symbols (bsc#1163762).\n- bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n- bcache: fix a lost wake-up problem caused by mca_cannibalize_lock (bsc#1163762).\n- bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n- bcache: fix deadlock in bcache_allocator (bsc#1163762).\n- bcache: fix incorrect data type usage in btree_flush_write() (bsc#1163762).\n- bcache: fix memory corruption in bch_cache_accounting_clear() (bsc#1163762).\n- bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n- bcache: ignore pending signals when creating gc and allocator thread (bsc#1163762, bsc#1112504).\n- bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n- bcache: reap c-\u003ebtree_cache_freeable from the tail in bch_mca_scan() (bsc#1163762).\n- bcache: reap from tail of c-\u003ebtree_cache in bch_mca_scan() (bsc#1163762).\n- bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n- bcache: remove member accessed from struct btree (bsc#1163762).\n- bcache: remove the extra cflags for request.o (bsc#1163762).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (bsc#1163762, bsc#1112504).\n- bcma: remove set but not used variable \u0027sizel\u0027 (git-fixes).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1159377).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840).\n- blk-mq: make sure that line break can be printed (bsc#1159377).\n- blk-mq: make sure that line break can be printed (bsc#1164098).\n- Bluetooth: Fix race condition in hci_release_sock() (bsc#1051510).\n- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).\n- bnxt: apply computed clamp value for coalece parameter (bsc#1104745).\n- bnxt_en: Fix MSIX request logic for RDMA driver (bsc#1104745 ).\n- bnxt_en: Return error if FW returns more data than dump length (bsc#1104745).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).\n- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- bpf, offload: Unlock on error in bpf_offload_dev_create() (bsc#1109837).\n- bpf/sockmap: Read psock ingress_msg before sk_receive_queue (bsc#1083647).\n- bpf/stackmap: Fix deadlock with rq_lock in bpf_get_stack() (bsc#1083647).\n- bpf: add self-check logic to liveness analysis (bsc#1160618).\n- bpf: add verifier stats and log_level bit 2 (bsc#1160618).\n- bpf: Fix incorrect verifier simulation of ARSH under ALU32 (bsc#1083647).\n- bpf: improve stacksafe state comparison (bco#1160618).\n- bpf: improve verification speed by droping states (bsc#1160618).\n- bpf: improve verification speed by not remarking live_read (bsc#1160618).\n- bpf: improve verifier branch analysis (bsc#1160618).\n- bpf: increase complexity limit and maximum program size (bsc#1160618).\n- bpf: increase verifier log limit (bsc#1160618).\n- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).\n- bpf: Reject indirect var_off stack access in raw mode (bsc#1160618).\n- bpf: Reject indirect var_off stack access in unpriv mode (bco#1160618).\n- bpf: Sanity check max value for var_off stack access (bco#1160618).\n- bpf: skmsg, fix potential psock NULL pointer dereference (bsc#1109837).\n- bpf: speed up stacksafe check (bco#1160618).\n- bpf: Support variable offset stack access from helpers (bco#1160618).\n- bpf: verifier: teach the verifier to reason about the BPF_JSET instruction (bco#1160618).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_p2p_create_p2pdev() (bsc#1111666).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- brcmfmac: sdio: Fix OOB interrupt initialization on brcm43362 (bsc#1111666).\n- brcmfmac: set F2 watermark to 256 for 4373 (bsc#1111666).\n- brcmfmac: set SDIO F1 MesBusyCtrl for CYW4373 (bsc#1111666).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: do not double lock the subvol_sem for rename exchange (bsc#1162943).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- btrfs: fix infinite loop during fsync after rename operations (bsc#1163383).\n- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- btrfs: fix race between adding and putting tree mod seq elements and nodes (bsc#1163384).\n- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1051510).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can: peak_usb: report bus recovery as well (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).\n- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n- cdrom: respect device capabilities during opening action (boo#1164632).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix deadlocks in autodisconnect work (bsc#1111666).\n- cfg80211: fix memory leak in cfg80211_cqm_rssi_update (bsc#1111666).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).\n- cgroup: pids: use atomic64_t for pids-\u003elimit (bsc#1161514).\n- chardev: Avoid potential use-after-free in \u0027chrdev_open()\u0027 (bsc#1163849).\n- cifs: add support for flock (bsc#1144333).\n- cifs: Close cached root handle only if it had a lease (bsc#1144333).\n- cifs: Close open handle after interrupted close (bsc#1144333).\n- cifs: close the shared root handle on tree disconnect (bsc#1144333).\n- cifs: Do not miss cancelled OPEN responses (bsc#1144333).\n- cifs: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- cifs: fix mount option display for sec=krb5i (bsc#1161907).\n- cifs: Fix mount options set in automount (bsc#1144333).\n- cifs: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- cifs: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- cifs: Properly process SMB3 lease breaks (bsc#1144333).\n- cifs: remove set but not used variables \u0027cinode\u0027 and \u0027netfid\u0027 (bsc#1144333).\n- cifs: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: imx: clk-composite-8m: add lock to gate/mux (git-fixes).\n- clk: mmp2: Fix the order of timer mux parents (bsc#1051510).\n- clk: qcom: rcg2: Do not crash if our parent can\u0027t be found; return an error (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: sunxi-ng: add mux and pll notifiers for A64 CPU clock (bsc#1051510).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clk: tegra: Mark fuse clock as critical (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource: Prevent double add_timer_on() for watchdog_timer (bsc#1051510).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- configfs_register_group() shouldn\u0027t be (and isn\u0027t) called in rmdirable parts (bsc#1051510).\n- copy/pasted \u0027Recommends:\u0027 instead of \u0027Provides:\u0027, \u0027Obsoletes:\u0027 and \u0027Conflicts:\n- Cover up kABI breakage due to DH key verification (bsc#1155331).\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn-\u003ealg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: caam/qi2 - fix typo in algorithm\u0027s driver name (bsc#1111666).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: dh - add public key verification test (bsc#1155331).\n- crypto: dh - fix calculating encoded key size (bsc#1155331).\n- crypto: dh - fix memory leak (bsc#1155331).\n- crypto: dh - update test for public key verification (bsc#1155331).\n- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n- crypto: ecdh - add public key verification test (bsc#1155331).\n- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- Documentation: Document arm64 kpti control (bsc#1162623).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).\n- drivers/regulator: fix a missing check of return value (bsc#1051510).\n- drm/amd/display: Retrain dongles when SINK_COUNT becomes non-zero (bsc#1111666).\n- drm/amd/powerplay: remove set but not used variable \u0027us_mvdd\u0027 (bsc#1111666).\n- drm/amdgpu/{uvd,vcn}: fetch ring\u0027s read_ptr after alloc (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_device_set_cg_state\u0027 (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)\n- drm/amdgpu: fix ring test failure issue during s3 in vce 3.0 (V2) (bsc#1111666).\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027invalid\u0027 (bsc#1111666).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915/gvt: Pin vgpu dma address before using (bsc#1112178)\n- drm/i915/gvt: set guest display buffer as readonly (bsc#1112178)\n- drm/i915/gvt: use vgpu lock for active state setting (bsc#1112178)\n- drm/i915/perf: add missing delay for OA muxes configuration (bsc#1111666).\n- drm/i915: Add missing include file \u003clinux/math64.h\u003e (bsc#1051510).\n- drm/i915: Call dma_set_max_seg_size() in i915_driver_hw_probe() (bsc#1111666).\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm/i915: Handle vm_mmap error during I915_GEM_MMAP ioctl with WC set (bsc#1111666).\n- drm/i915: Make sure cdclk is high enough for DP audio on VLV/CHV (bsc#1111666).\n- drm/i915: Reacquire priolist cache after dropping the engine lock (bsc#1129770).\n- drm/i915: Sanity check mmap length against object size (bsc#1111666).\n- drm/msm: include linux/sched/task.h (bsc#1112178)\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/nouveau/bar/gf100: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/bar/nv50: check bar1 vmm return value (bsc#1111666).\n- drm/nouveau/mmu: qualify vmm during dtor (bsc#1111666).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/rect: Avoid division by zero (bsc#1111666).\n- drm/rect: update kerneldoc for drm_rect_clip_scaled() (bsc#1111666).\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)\n- drm/sun4i: hdmi: Remove duplicate cleanup calls (bsc#1113956)\n- drm/sun4i: tcon: Set min division of TCON0_DCLK to 1 (bsc#1111666).\n- drm/sun4i: tcon: Set RGB DCLK min. divider based on hardware model (bsc#1111666).\n- drm/ttm: ttm_tt_init_fields() can be static (bsc#1111666).\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n- drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable (bsc#1111666).\n- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)\n- e1000e: Add support for Comet Lake (bsc#1158533).\n- e1000e: Add support for Tiger Lake (bsc#1158533).\n- e1000e: Increase pause and refresh time (bsc#1158533).\n- e100: Fix passing zero to \u0027PTR_ERR\u0027 warning in e100_load_ucode_wait (bsc#1051510).\n- ecryptfs_lookup_interpose(): lower_dentry-\u003ed_inode is not stable (bsc#1158646).\n- ecryptfs_lookup_interpose(): lower_dentry-\u003ed_parent is not stable either (bsc#1158647).\n- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n- Enable CONFIG_BLK_DEV_SR_VENDOR (boo#1164632).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- ext2: check err when partial != NULL (bsc#1163859).\n- ext4, jbd2: ensure panic when aborting with zero errno (bsc#1163853).\n- ext4: check for directory entries too close to block end (bsc#1163861).\n- ext4: fix a bug in ext4_wait_for_tail_page_commit (bsc#1163841).\n- ext4: fix checksum errors with indexed dirs (bsc#1160979).\n- ext4: fix deadlock allocating crypto bounce page from mempool (bsc#1163842).\n- ext4: Fix mount failure with quota configured as module (bsc#1164471).\n- ext4: fix mount failure with quota configured as module (bsc#1164471).\n- ext4: fix punch hole for inline_data file systems (bsc#1158640).\n- ext4: improve explanation of a mount failure caused by a misconfigured kernel (bsc#1163843).\n- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- firestream: fix memory leaks (bsc#1051510).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- fix partial checked out tree build ... so that bisection does not break.\n- fix the locking in dcache_readdir() and friends (bsc#1123328).\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/open.c: allow opening only regular files during execve() (bsc#1163845).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- fscrypt: do not set policy for a dead directory (bsc#1163846).\n- ftrace: Add comment to why rcu_dereference_sched() is open coded (git-fixes).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- ftrace: Protect ftrace_graph_hash with ftrace_sync (git-fixes).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- gtp: avoid zero size hashtable (networking-stable-20_01_01).\n- gtp: do not allow adding duplicate tid and ms_addr pdp context (networking-stable-20_01_01).\n- gtp: fix an use-after-free in ipv4_pdp_find() (networking-stable-20_01_01).\n- gtp: fix wrong condition in gtp_genl_dump_pdp() (networking-stable-20_01_01).\n- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- hotplug/drc-info: Add code to search ibm,drc-info property (bsc#1157480 ltc#181028).\n- hv_netvsc: Fix offset usage in netvsc_send_table() (bsc#1164598).\n- hv_netvsc: Fix send_table offset in case of a host bug (bsc#1164598).\n- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1164598).\n- hv_netvsc: Fix unwanted rx_table reset (bsc#1164598).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (k10temp) Add support for AMD family 17h, model 70h CPUs (bsc#1163206).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- hwmon: (pmbus/ltc2978) Fix PMBus polling of MFR_COMMON definitions (bsc#1051510).\n- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- IB/hfi1: Do not cancel unused work item (bsc#1114685 ).\n- IB/mlx5: Fix steering rule of drop and count (bsc#1103991 ).\n- IB/mlx5: Remove dead code (bsc#1103991).\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ice: fix stack leakage (bsc#1118661).\n- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- iomap: Fix pipe page leakage during splicing (bsc#1158651).\n- iommu/amd: Fix IOMMU perf counter clobbering during init (bsc#1162617).\n- iommu/arm-smmu-v3: Populate VMID field for CMDQ_OP_TLBI_NH_VA (bsc#1164314).\n- iommu/io-pgtable-arm: Fix race handling in split_blk_unmap() (bsc#1164115).\n- iommu/iova: Init the struct iova to fix the possible memleak (bsc#1160469).\n- iommu/mediatek: Correct the flush_iotlb_all callback (bsc#1160470).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- ipmi: Do not allow device module unload when in use (bsc#1154768).\n- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: change monitor DMA to be coherent (bsc#1161243).\n- iwlwifi: clear persistence bit according to device family (bsc#1111666).\n- iwlwifi: do not throw error when trying to remove IGTK (bsc#1051510).\n- iwlwifi: mvm: fix NVM check for 3168 devices (bsc#1051510).\n- iwlwifi: mvm: force TCM re-evaluation on TCM resume (bsc#1111666).\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- iwlwifi: pcie: fix erroneous print (bsc#1111666).\n- iwlwifi: trans: Clear persistence bit when starting the FW (bsc#1111666).\n- jbd2: clear JBD2_ABORT flag before journal_reset to update log tail info when load journal (bsc#1163862).\n- jbd2: do not clear the BH_Mapped flag when forgetting a metadata buffer (bsc#1163836).\n- jbd2: Fix possible overflow in jbd2_log_space_left() (bsc#1163860).\n- jbd2: make sure ESHUTDOWN to be recorded in the journal superblock (bsc#1163863).\n- jbd2: move the clearing of b_modified flag to the journal_unmap_buffer() (bsc#1163880).\n- jbd2: switch to use jbd2_journal_abort() when failed to submit the commit record (bsc#1163852).\n- kABI fix for \u0027ipmi: Do not allow device module unload when in use\u0027 (bsc#1154768).\n- kABI fixup for alloc_dax_region (bsc#1158071,bsc#1160678).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kABI/severities: Whitelist rpaphp_get_drc_props (bsc#1157480 ltc#181028).\n- kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n- kABI: protect struct sctp_ep_common (kabi).\n- kABI: Protest new fields in BPF structs (bsc#1160618).\n- kconfig: fix broken dependency in randconfig-generated .config (bsc#1051510).\n- kernel-binary.spec.in: do not recommend firmware for kvmsmall and azure flavor (boo#1161360).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n- kexec: bail out upon SIGKILL when allocating memory (git-fixes).\n- KVM: Clean up __kvm_gfn_to_hva_cache_init() and its callers (bsc#1133021).\n- KVM: fix spectrev1 gadgets (bsc#1164705).\n- KVM: PPC: Book3S HV: Uninit vCPU if vcore creation fails (bsc#1061840).\n- KVM: PPC: Book3S PR: Fix -Werror=return-type build failure (bsc#1061840).\n- KVM: PPC: Book3S PR: Free shared page if mmu initialization fails (bsc#1061840).\n- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).\n- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).\n- KVM: SVM: Override default MMIO mask if memory encryption is enabled (bsc#1162618).\n- KVM: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).\n- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).\n- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).\n- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).\n- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).\n- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).\n- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).\n- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).\n- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).\n- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).\n- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).\n- KVM: x86: Remove a spurious export of a static function (bsc#1158954).\n- lcoking/rwsem: Add missing ACQUIRE to read_slowpath sleep loop (bsc#1050549).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- lib: crc64: include \u003clinux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- libnvdimm/namespace: Differentiate between probe mapping and runtime mapping (bsc#1153535).\n- libnvdimm/pfn: Account for PAGE_SIZE \u003e info-block-size in nd_pfn_init() (bsc#1127682 bsc#1153535 ltc#175033 ltc#181834).\n- libnvdimm: Fix devm_nsio_enable() kabi (bsc#1153535).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- locking/rwsem: Prevent decrement of reader count before increment (bsc#1050549).\n- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- mac80211: fix ieee80211_txq_setup_flows() failure path (bsc#1111666).\n- mac80211: fix station inactive_time shortly after boot (bsc#1051510).\n- mac80211: Fix TKIP replay protection immediately after key setup (bsc#1051510).\n- mac80211: mesh: restrict airtime metric to peered established plinks (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).\n- md/raid0: Fix buffer overflow at debug print (bsc#1164051).\n- media/v4l2-core: set pages dirty upon releasing DMA buffers (bsc#1051510).\n- media: af9005: uninitialized variable printked (bsc#1051510).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: CEC 2.0-only bcast messages were ignored (git-fixes).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: digitv: do not continue if remote control state can\u0027t be read (bsc#1051510).\n- media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0 (bsc#1051510).\n- media: exynos4-is: fix wrong mdev and v4l2 dev order in error path (git-fixes).\n- media: gspca: zero usb_buf (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov6650: Fix control handler not freed on init error (git-fixes).\n- media: ov6650: Fix crop rectangle alignment not passed back (git-fixes).\n- media: ov6650: Fix incorrect use of JPEG colorspace (git-fixes).\n- media: pulse8-cec: fix lost cec_transmit_attempt_done() call.\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media: uvcvideo: Fix error path in control parsing failure (git-fixes).\n- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- mei: bus: prefix device names on bus with the bus name (bsc#1051510).\n- mfd: da9062: Fix watchdog compatible string (bsc#1051510).\n- mfd: dln2: More sanity checking for endpoints (bsc#1051510).\n- mfd: rn5t618: Mark ADC control register volatile (bsc#1051510).\n- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b (\u0027rpm/kernel-subpackage-spec: Unify dependency handling.\u0027) Fixes: 3fd22e219f77 (\u0027rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\u0027)\n- mlxsw: spectrum_qdisc: Ignore grafting of invisible FIFO (bsc#1112374).\n- mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel (bsc#1112374).\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: Revert \u0027mmc: sdhci-of-esdhc: add erratum A-009204 support\u0027 (bsc#1051510).\n- mmc: sdhci: Add a quirk for broken command queuing (git-fixes).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK (git-fixes).\n- mmc: spi: Toggle SPI polarity, do not hardcode it (bsc#1051510).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- moduleparam: fix parameter description mismatch (bsc#1051510).\n- mod_devicetable: fix PHY module format (networking-stable-19_12_28).\n- mqprio: Fix out-of-bounds access in mqprio_dump (bsc#1109837).\n- mtd: fix mtd_oobavail() incoherent returned value (bsc#1051510).\n- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).\n- mwifiex: delete unused mwifiex_get_intf_num() (bsc#1111666).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).\n- mwifiex: update set_mac_address logic (bsc#1111666).\n- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1163851).\n- nbd: prevent memory leak (bsc#1158638).\n- net, sysctl: Fix compiler warning when only cBPF is present (bsc#1109837).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx4_en: Fix wrong limitation for number of TX rings (bsc#1103989).\n- net/mlx5: Accumulate levels for chains prio namespaces (bsc#1103990).\n- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n- net/mlx5: Update the list of the PCI supported devices (bsc#1127611).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n- net/mlx5e: Query global pause state before setting prio2buffer (bsc#1103990).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net: add sendmsg_locked and sendpage_locked to af_inet6 (bsc#1144162).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n- net: dst: Force 4-byte alignment of dst_metrics (networking-stable-19_12_28).\n- net: ena: fix napi handler misbehavior when the napi budget is zero (networking-stable-20_01_01).\n- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n- net: hisilicon: Fix a BUG trigered by wrong bytes_compl (networking-stable-19_12_28).\n- net: hns3: fix ETS bandwidth validation bug (bsc#1104353 ).\n- net: nfc: nci: fix a possible sleep-in-atomic-context bug in nci_uart_tty_receive() (networking-stable-19_12_28).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).\n- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: Check against net_device being NULL (bsc#1051510).\n- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).\n- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).\n- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).\n- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).\n- net: phy: marvell: clear wol event before setting it (bsc#1051510).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: meson-gxl: check phy_write return value (bsc#1051510).\n- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: mscc: read \u0027vsc8531, edge-slowdown\u0027 as an u32 (bsc#1051510).\n- net: phy: mscc: read \u0027vsc8531,vddmac\u0027 as an u32 (bsc#1051510).\n- net: phy: xgene: disable clk on error paths (bsc#1051510).\n- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).\n- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).\n- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: qlogic: Fix error paths in ql_alloc_large_buffers() (networking-stable-19_12_28).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net: sched: correct flower port blocking (git-fixes).\n- net: sched: ensure opts_len \u003c= IP_TUNNEL_OPTS_MAX in act_tunnel_key (bsc#1109837).\n- net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues (bsc#1109837).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net: usb: lan78xx: Fix suspend/resume PHY register access error (networking-stable-19_12_28).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- NFC: fdp: fix incorrect free object (networking-stable-19_11_10).\n- NFC: pn533: fix bulk-message timeout (bsc#1051510).\n- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- NFC: st21nfca: fix double free (networking-stable-19_11_10).\n- nvme: fix the parameter order for nvme_get_log in nvme_get_fw_slot_info (bsc#1163774).\n- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n- ocfs2: fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1158649).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- PCI/IOV: Fix memory leak in pci_iov_add_virtfn() (git-fixes).\n- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- PCI: Add DMA alias quirk for Intel VCA NTB (bsc#1051510).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI: pciehp: Avoid returning prematurely from sysfs requests (git-fixes).\n- PCI: rpaphp: Add drc-info support for hotplug slot registration (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Annotate and correctly byte swap DRC properties (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Avoid a sometimes-uninitialized warning (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Correctly match ibm, my-drc-index to drc-name when using drc-info (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Do not rely on firmware feature to imply drc-info support (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Fix up pointer to first drc-info entry (bsc#1157480 ltc#181028).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1114279).\n- perf/x86/intel: Fix inaccurate period in context switch for auto-reload (bsc#1164315).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctrl: cherryview: Fix irq_valid_mask calculation (bsc#1111666).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).\n- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).\n- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).\n- power: supply: ltc2941-battery-gauge: fix use-after-free (bsc#1051510).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/papr_scm: Do not enable direct map for a region by default (bsc#1129551).\n- powerpc/papr_scm: Fix leaking \u0027bus_desc.provider_name\u0027 in some paths (bsc#1142685 ltc#179509).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/pseries/hotplug-memory: Change rc variable to bool (bsc#1065729).\n- powerpc/pseries/lparcfg: Fix display of Maximum Memory (bsc#1162028 ltc#181740).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/pseries/vio: Fix iommu_table use-after-free refcount warning (bsc#1065729).\n- powerpc/pseries: Add cpu DLPAR support for drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Advance pfn if section is not present in lmb_is_removable() (bsc#1065729).\n- powerpc/pseries: Allow not having ibm, hypertas-functions::hcall-multi-tce for DDW (bsc#1065729).\n- powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init() (git-fixes).\n- powerpc/pseries: Enable support for ibm,drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix bad drc_index_start value parsing of drc-info entry (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix drc-info mappings of logical cpus to drc-index (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix vector5 in ibm architecture vector table (bsc#1157480 ltc#181028).\n- powerpc/pseries: Revert support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: avoid adjusting memory_limit for capture kernel memory reservation (bsc#1140025 ltc#176086).\n- powerpc: Enable support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- powerpc: reserve memory for capture kernel after hugepages init (bsc#1140025 ltc#176086).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- pseries/drc-info: Search DRC properties for CPU indexes (bsc#1157480 ltc#181028).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- pwm: Clear chip_data in pwm_put() (bsc#1051510).\n- pwm: clps711x: Fix period calculation (bsc#1051510).\n- pwm: omap-dmtimer: Remove PWM chip in .remove before making it unfunctional (git-fixes).\n- pwm: Remove set but not set variable \u0027pwm\u0027 (git-fixes).\n- pxa168fb: Fix the function used to release some memory in an error (bsc#1114279)\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qede: Fix multicast mac configuration (networking-stable-19_12_28).\n- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).\n- qmi_wwan: Add support for Quectel RM500Q (bsc#1051510).\n- quota: Check that quota is not dirty before release (bsc#1163858).\n- quota: fix livelock in dquot_writeback_dquots (bsc#1163857).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- r8152: get default setting of WOL before initializing (bsc#1051510).\n- random: move FIPS continuous test to output functions (bsc#1155334).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- RDMA/bnxt_re: Enable SRIOV VF support on Broadcom\u0027s 57500 adapter series (bsc#1154916).\n- RDMA/bnxt_re: Fix chip number validation Broadcom\u0027s Gen P5 series (bsc#1157895).\n- RDMA/bnxt_re: Fix missing le16_to_cpu (bsc#1157895).\n- RDMA/hns: Bugfix for qpc/cqc timer configuration (bsc#1104427 bsc#1126206).\n- RDMA/hns: Correct the value of srq_desc_size (bsc#1104427 ).\n- RDMA/hns: Fix to support 64K page for srq (bsc#1104427 ).\n- RDMA/hns: Prevent memory leaks of eq-\u003ebuf_list (bsc#1104427 ).\n- README.BRANCH: Removing myself from the maintainer list\n- README.BRANCH: Update the branch name to cve/linux-4.12\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- regulator: tps65910: fix a missing check of return value (bsc#1051510).\n- reiserfs: Fix memory leak of journal device string (bsc#1163867).\n- reiserfs: Fix spurious unlock in reiserfs_fill_super() error handling (bsc#1163869).\n- reset: fix reset_control_ops kerneldoc comment (bsc#1051510).\n- resource: fix locking in find_next_iomem_res() (bsc#1114279).\n- Revert \u0027ath10k: fix DMA related firmware crashes on multiple devices\u0027 (git-fixes).\n- Revert \u0027Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers\u0027 (bsc#1051510).\n- Revert \u0027locking/pvqspinlock: Do not wait if vCPU is preempted\u0027 (bsc#1050549).\n- Revert \u0027mmc: sdhci: Fix incorrect switch to HS mode\u0027 (bsc#1051510).\n- rpm/kabi.pl: support new (\u003e=5.4) Module.symvers format (new symbol namespace field)\n- rpm/kernel-binary.spec.in: Conflict with too old powerpc-utils (jsc#ECO-920, jsc#SLE-11054, jsc#SLE-11322).\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages\n- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n- rpm/kernel-subpackage-spec: fix kernel-default-base build There were some issues with recent changes to subpackage dependencies handling:\n- rpm/kernel-subpackage-spec: Unify dependency handling.\n- rpm/modules.fips: update module list (bsc#1157853)\n- rsi_91x_usb: fix interface sanity check (git-fixes).\n- rt2800: remove errornous duplicate condition (git-fixes).\n- rtc: cmos: Stop using shared IRQ (bsc#1051510).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: hym8563: Return -EINVAL if the time is known to be invalid (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in \u0027max8997_rtc_read_alarm()\u0027 (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf\u0027s type to u8 in s35390a_init (bsc#1051510).\n- rtl818x: fix potential use after free (bsc#1051510).\n- rtl8xxxu: fix interface sanity check (git-fixes).\n- rtlwifi: Fix MAX MPDU of VHT capability (git-fixes).\n- rtlwifi: Remove redundant semicolon in wifi.h (git-fixes).\n- rtlwifi: rtl8192de: Fix missing callback that tests for hw release of buffer (bsc#1111666).\n- s390/qeth: clean up page frag creation (git-fixes).\n- s390/qeth: consolidate skb allocation (git-fixes).\n- s390/qeth: ensure linear access to packet headers (git-fixes).\n- s390/qeth: guard against runt packets (git-fixes).\n- sched/fair: Add tmp_alone_branch assertion (bnc#1156462).\n- sched/fair: Fix insertion in rq-\u003eleaf_cfs_rq_list (bnc#1156462).\n- sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).\n- sched/fair: Optimize update_blocked_averages() (bnc#1156462).\n- sched/fair: WARN() and refuse to set buddy when !se-\u003eon_rq (bsc#1158132).\n- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1154601).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Correctly retrieve and interpret active flash region (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix a NULL pointer dereference in an error path (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix unbound NVME response length (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- scsi: zfcp: trace channel log even for FCP command responses (git-fixes).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- sctp: fully initialize v4 addr in some functions (networking-stable-19_12_28).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: max310x: Fix tx_empty() callback (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- sfc: Remove \u0027PCIE error reporting unavailable\u0027 (bsc#1161472).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- smb3: Fix persistent handles reconnect (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: remove confusing dmesg when mounting with encryption (\u0027seal\u0027) (bsc#1144333).\n- soc/tegra: fuse: Correct straps\u0027 address for older Tegra124 device trees (bsc#1051510).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- soc: ti: wkup_m3_ipc: Fix race condition with rproc_boot (bsc#1051510).\n- spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch (bsc#1051510).\n- spi: omap2-mcspi: Set FIFO DMA trigger level to word length (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- sr_vendor: support Beurer GL50 evo CD-on-a-chip devices (boo#1164632).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- Staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: rtl8192e: fix potential use after free (bsc#1051510).\n- staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids (bsc#1051510).\n- staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).\n- staging: vt6656: correct packet types for CTS protect, mode (bsc#1051510).\n- staging: vt6656: Fix false Tx excessive retries reporting (bsc#1051510).\n- staging: vt6656: use NULLFUCTION stack on mac80211 (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- stm class: Fix a double free of stm_source_device (bsc#1051510).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810, bsc#1161702).\n- stop_machine: Atomically queue and wake stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption after queueing stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption when waking two stopper threads (bsc#1088810, bsc#1161702).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1160560).\n- tcp: do not send empty skb from tcp_write_xmit() (networking-stable-20_01_01).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).\n- tipc: fix a missing check of genlmsg_put (bsc#1051510).\n- tipc: fix link name length check (bsc#1051510).\n- tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).\n- tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).\n- tracing: Annotate ftrace_graph_hash pointer with __rcu (git-fixes).\n- tracing: Annotate ftrace_graph_notrace_hash pointer with __rcu (git-fixes).\n- tracing: Fix tracing_stat return values in error handling paths (git-fixes).\n- tracing: Fix very unlikely race of registering two stat tracers (git-fixes).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- uaccess: Add non-pagefault user-space write function (bsc#1083647).\n- ubifs: Correctly initialize c-\u003emin_log_bytes (bsc#1158641).\n- ubifs: do not trigger assertion on invalid no-key filename (bsc#1163850).\n- ubifs: Fix deadlock in concurrent bulk-read and writepage (bsc#1163856).\n- ubifs: Fix FS_IOC_SETFLAGS unexpectedly clearing encrypt flag (bsc#1163855).\n- ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n- ubifs: Reject unsupported ioctl flags explicitly (bsc#1163844).\n- udp: fix integer overflow while computing available space in sk_rcvbuf (networking-stable-20_01_01).\n- usb-storage: Disable UAS on JMicron SATA enclosure (bsc#1051510).\n- usb: adutux: fix interface sanity check (bsc#1051510).\n- usb: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- usb: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- usb: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- usb: core: fix check for duplicate endpoints (git-fixes).\n- usb: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- usb: core: urb: fix URB structure initialization function (bsc#1051510).\n- usb: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- usb: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- usb: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- usb: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- usb: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- usb: EHCI: Do not return -EPIPE when hub is disconnected (git-fixes).\n- usb: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).\n- usb: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- usb: gadget: legacy: set max_speed to super-speed (bsc#1051510).\n- usb: gadget: pch_udc: fix use after free (bsc#1051510).\n- usb: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- usb: gadget: Zero ffs_io_data (bsc#1051510).\n- usb: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- usb: idmouse: fix interface sanity checks (bsc#1051510).\n- usb: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n- usb: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- usb: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- usb: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- usb: roles: fix a potential use after free (git-fixes).\n- usb: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).\n- usb: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- usb: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n- usb: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- usb: serial: io_edgeport: use irqsave() in USB\u0027s complete callback (bsc#1051510).\n- usb: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- usb: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- usb: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- usb: serial: keyspan: handle unbound ports (bsc#1051510).\n- usb: serial: opticon: fix control-message timeouts (bsc#1051510).\n- usb: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- usb: serial: option: add support for Quectel RM500Q in QDL mode (git-fixes).\n- usb: serial: option: add Telit ME910G1 0x110a composition (git-fixes).\n- usb: serial: option: add ZLP support for 0x1bc7/0x9010 (git-fixes).\n- usb: serial: quatech2: handle unbound ports (bsc#1051510).\n- usb: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- usb: serial: suppress driver bind attributes (bsc#1051510).\n- usb: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- usb: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- usb: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- usb: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- usb: xhci: only set D3hot for pci device (bsc#1051510).\n- usbip: Fix error path of vhci_recv_ret_submit() (git-fixes).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1 (bsc#1051510).\n- vhost/vsock: accept only packets with the right dst_cid (networking-stable-20_01_01).\n- video: backlight: Add devres versions of of_find_backlight (bsc#1090888) Taken for 6010831dde5.\n- video: backlight: Add of_find_backlight helper in backlight.c (bsc#1090888) Taken for 6010831dde5.\n- watchdog: max77620_wdt: fix potential build errors (bsc#1051510).\n- watchdog: rn5t618_wdt: fix module aliases (bsc#1051510).\n- watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).\n- watchdog: wdat_wdt: fix get_timeleft call for wdat_wdt (bsc#1162557).\n- wireless: fix enabling channel 12 for custom regulatory domain (bsc#1051510).\n- wireless: wext: avoid gcc -O3 warning (bsc#1051510).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 70h (bsc#1163206).\n- x86/cpu: Update cached HLE state on write to TSX_CTRL_CPUID_CLEAR (bsc#1162619).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/resctrl: Check monitoring static key in the MBM overflow handler (bsc#1114279).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free when deleting resource groups (bsc#1114279).\n- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xen/balloon: Support xend-based toolstack take two (bsc#1065600).\n- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xen: Enable interrupts when calling _cond_resched() (bsc#1065600).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-560,SUSE-SLE-Module-Basesystem-15-SP1-2020-560,SUSE-SLE-Module-Development-Tools-15-SP1-2020-560,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-560,SUSE-SLE-Module-Legacy-15-SP1-2020-560,SUSE-SLE-Module-Live-Patching-15-SP1-2020-560,SUSE-SLE-Product-HA-15-SP1-2020-560,SUSE-SLE-Product-WE-15-SP1-2020-560",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0560-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:0560-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200560-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:0560-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1046303",
        "url": "https://bugzilla.suse.com/1046303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050244",
        "url": "https://bugzilla.suse.com/1050244"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050549",
        "url": "https://bugzilla.suse.com/1050549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051858",
        "url": "https://bugzilla.suse.com/1051858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061840",
        "url": "https://bugzilla.suse.com/1061840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1083647",
        "url": "https://bugzilla.suse.com/1083647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085030",
        "url": "https://bugzilla.suse.com/1085030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086301",
        "url": "https://bugzilla.suse.com/1086301"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086313",
        "url": "https://bugzilla.suse.com/1086313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086314",
        "url": "https://bugzilla.suse.com/1086314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088810",
        "url": "https://bugzilla.suse.com/1088810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1090888",
        "url": "https://bugzilla.suse.com/1090888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103989",
        "url": "https://bugzilla.suse.com/1103989"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103990",
        "url": "https://bugzilla.suse.com/1103990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103991",
        "url": "https://bugzilla.suse.com/1103991"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104353",
        "url": "https://bugzilla.suse.com/1104353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104427",
        "url": "https://bugzilla.suse.com/1104427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104745",
        "url": "https://bugzilla.suse.com/1104745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1105392",
        "url": "https://bugzilla.suse.com/1105392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1109837",
        "url": "https://bugzilla.suse.com/1109837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111666",
        "url": "https://bugzilla.suse.com/1111666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112374",
        "url": "https://bugzilla.suse.com/1112374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112504",
        "url": "https://bugzilla.suse.com/1112504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113956",
        "url": "https://bugzilla.suse.com/1113956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114685",
        "url": "https://bugzilla.suse.com/1114685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1115026",
        "url": "https://bugzilla.suse.com/1115026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118338",
        "url": "https://bugzilla.suse.com/1118338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118661",
        "url": "https://bugzilla.suse.com/1118661"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1123328",
        "url": "https://bugzilla.suse.com/1123328"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126206",
        "url": "https://bugzilla.suse.com/1126206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127371",
        "url": "https://bugzilla.suse.com/1127371"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127611",
        "url": "https://bugzilla.suse.com/1127611"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127682",
        "url": "https://bugzilla.suse.com/1127682"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129551",
        "url": "https://bugzilla.suse.com/1129551"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129770",
        "url": "https://bugzilla.suse.com/1129770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133147",
        "url": "https://bugzilla.suse.com/1133147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1134973",
        "url": "https://bugzilla.suse.com/1134973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1140025",
        "url": "https://bugzilla.suse.com/1140025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1142685",
        "url": "https://bugzilla.suse.com/1142685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1143959",
        "url": "https://bugzilla.suse.com/1143959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144162",
        "url": "https://bugzilla.suse.com/1144162"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144333",
        "url": "https://bugzilla.suse.com/1144333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146519",
        "url": "https://bugzilla.suse.com/1146519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146544",
        "url": "https://bugzilla.suse.com/1146544"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151548",
        "url": "https://bugzilla.suse.com/1151548"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151910",
        "url": "https://bugzilla.suse.com/1151910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151927",
        "url": "https://bugzilla.suse.com/1151927"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152107",
        "url": "https://bugzilla.suse.com/1152107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152631",
        "url": "https://bugzilla.suse.com/1152631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153535",
        "url": "https://bugzilla.suse.com/1153535"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153917",
        "url": "https://bugzilla.suse.com/1153917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154243",
        "url": "https://bugzilla.suse.com/1154243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154601",
        "url": "https://bugzilla.suse.com/1154601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154768",
        "url": "https://bugzilla.suse.com/1154768"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154916",
        "url": "https://bugzilla.suse.com/1154916"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155331",
        "url": "https://bugzilla.suse.com/1155331"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155334",
        "url": "https://bugzilla.suse.com/1155334"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155689",
        "url": "https://bugzilla.suse.com/1155689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156259",
        "url": "https://bugzilla.suse.com/1156259"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156286",
        "url": "https://bugzilla.suse.com/1156286"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156462",
        "url": "https://bugzilla.suse.com/1156462"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157155",
        "url": "https://bugzilla.suse.com/1157155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157157",
        "url": "https://bugzilla.suse.com/1157157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157169",
        "url": "https://bugzilla.suse.com/1157169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157303",
        "url": "https://bugzilla.suse.com/1157303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157424",
        "url": "https://bugzilla.suse.com/1157424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157480",
        "url": "https://bugzilla.suse.com/1157480"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157692",
        "url": "https://bugzilla.suse.com/1157692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157853",
        "url": "https://bugzilla.suse.com/1157853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157895",
        "url": "https://bugzilla.suse.com/1157895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157908",
        "url": "https://bugzilla.suse.com/1157908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157966",
        "url": "https://bugzilla.suse.com/1157966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158013",
        "url": "https://bugzilla.suse.com/1158013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158021",
        "url": "https://bugzilla.suse.com/1158021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158026",
        "url": "https://bugzilla.suse.com/1158026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158071",
        "url": "https://bugzilla.suse.com/1158071"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158094",
        "url": "https://bugzilla.suse.com/1158094"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158132",
        "url": "https://bugzilla.suse.com/1158132"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158381",
        "url": "https://bugzilla.suse.com/1158381"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158533",
        "url": "https://bugzilla.suse.com/1158533"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158637",
        "url": "https://bugzilla.suse.com/1158637"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158638",
        "url": "https://bugzilla.suse.com/1158638"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158639",
        "url": "https://bugzilla.suse.com/1158639"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158640",
        "url": "https://bugzilla.suse.com/1158640"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158641",
        "url": "https://bugzilla.suse.com/1158641"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158643",
        "url": "https://bugzilla.suse.com/1158643"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158644",
        "url": "https://bugzilla.suse.com/1158644"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158645",
        "url": "https://bugzilla.suse.com/1158645"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158646",
        "url": "https://bugzilla.suse.com/1158646"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158647",
        "url": "https://bugzilla.suse.com/1158647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158649",
        "url": "https://bugzilla.suse.com/1158649"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158651",
        "url": "https://bugzilla.suse.com/1158651"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158652",
        "url": "https://bugzilla.suse.com/1158652"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158819",
        "url": "https://bugzilla.suse.com/1158819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158823",
        "url": "https://bugzilla.suse.com/1158823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158824",
        "url": "https://bugzilla.suse.com/1158824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158827",
        "url": "https://bugzilla.suse.com/1158827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158834",
        "url": "https://bugzilla.suse.com/1158834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158893",
        "url": "https://bugzilla.suse.com/1158893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158900",
        "url": "https://bugzilla.suse.com/1158900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158903",
        "url": "https://bugzilla.suse.com/1158903"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158904",
        "url": "https://bugzilla.suse.com/1158904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158954",
        "url": "https://bugzilla.suse.com/1158954"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159024",
        "url": "https://bugzilla.suse.com/1159024"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159028",
        "url": "https://bugzilla.suse.com/1159028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159271",
        "url": "https://bugzilla.suse.com/1159271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159297",
        "url": "https://bugzilla.suse.com/1159297"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159377",
        "url": "https://bugzilla.suse.com/1159377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159394",
        "url": "https://bugzilla.suse.com/1159394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159483",
        "url": "https://bugzilla.suse.com/1159483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159484",
        "url": "https://bugzilla.suse.com/1159484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159500",
        "url": "https://bugzilla.suse.com/1159500"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159569",
        "url": "https://bugzilla.suse.com/1159569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159588",
        "url": "https://bugzilla.suse.com/1159588"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159841",
        "url": "https://bugzilla.suse.com/1159841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159908",
        "url": "https://bugzilla.suse.com/1159908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159909",
        "url": "https://bugzilla.suse.com/1159909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159910",
        "url": "https://bugzilla.suse.com/1159910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159911",
        "url": "https://bugzilla.suse.com/1159911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159955",
        "url": "https://bugzilla.suse.com/1159955"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160147",
        "url": "https://bugzilla.suse.com/1160147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160195",
        "url": "https://bugzilla.suse.com/1160195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160210",
        "url": "https://bugzilla.suse.com/1160210"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160211",
        "url": "https://bugzilla.suse.com/1160211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160218",
        "url": "https://bugzilla.suse.com/1160218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160433",
        "url": "https://bugzilla.suse.com/1160433"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160442",
        "url": "https://bugzilla.suse.com/1160442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160469",
        "url": "https://bugzilla.suse.com/1160469"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160470",
        "url": "https://bugzilla.suse.com/1160470"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160476",
        "url": "https://bugzilla.suse.com/1160476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160560",
        "url": "https://bugzilla.suse.com/1160560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160618",
        "url": "https://bugzilla.suse.com/1160618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160678",
        "url": "https://bugzilla.suse.com/1160678"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160755",
        "url": "https://bugzilla.suse.com/1160755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160756",
        "url": "https://bugzilla.suse.com/1160756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160784",
        "url": "https://bugzilla.suse.com/1160784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160787",
        "url": "https://bugzilla.suse.com/1160787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160802",
        "url": "https://bugzilla.suse.com/1160802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160803",
        "url": "https://bugzilla.suse.com/1160803"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160804",
        "url": "https://bugzilla.suse.com/1160804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160917",
        "url": "https://bugzilla.suse.com/1160917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160966",
        "url": "https://bugzilla.suse.com/1160966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160979",
        "url": "https://bugzilla.suse.com/1160979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161087",
        "url": "https://bugzilla.suse.com/1161087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161243",
        "url": "https://bugzilla.suse.com/1161243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161360",
        "url": "https://bugzilla.suse.com/1161360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161472",
        "url": "https://bugzilla.suse.com/1161472"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161514",
        "url": "https://bugzilla.suse.com/1161514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161518",
        "url": "https://bugzilla.suse.com/1161518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161522",
        "url": "https://bugzilla.suse.com/1161522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161523",
        "url": "https://bugzilla.suse.com/1161523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161549",
        "url": "https://bugzilla.suse.com/1161549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161552",
        "url": "https://bugzilla.suse.com/1161552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161674",
        "url": "https://bugzilla.suse.com/1161674"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161702",
        "url": "https://bugzilla.suse.com/1161702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161907",
        "url": "https://bugzilla.suse.com/1161907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161931",
        "url": "https://bugzilla.suse.com/1161931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161933",
        "url": "https://bugzilla.suse.com/1161933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161934",
        "url": "https://bugzilla.suse.com/1161934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161935",
        "url": "https://bugzilla.suse.com/1161935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161936",
        "url": "https://bugzilla.suse.com/1161936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161937",
        "url": "https://bugzilla.suse.com/1161937"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162028",
        "url": "https://bugzilla.suse.com/1162028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162067",
        "url": "https://bugzilla.suse.com/1162067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162109",
        "url": "https://bugzilla.suse.com/1162109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162139",
        "url": "https://bugzilla.suse.com/1162139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162557",
        "url": "https://bugzilla.suse.com/1162557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162617",
        "url": "https://bugzilla.suse.com/1162617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162618",
        "url": "https://bugzilla.suse.com/1162618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162619",
        "url": "https://bugzilla.suse.com/1162619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162623",
        "url": "https://bugzilla.suse.com/1162623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162943",
        "url": "https://bugzilla.suse.com/1162943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163206",
        "url": "https://bugzilla.suse.com/1163206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163383",
        "url": "https://bugzilla.suse.com/1163383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163384",
        "url": "https://bugzilla.suse.com/1163384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163762",
        "url": "https://bugzilla.suse.com/1163762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163774",
        "url": "https://bugzilla.suse.com/1163774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163836",
        "url": "https://bugzilla.suse.com/1163836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163840",
        "url": "https://bugzilla.suse.com/1163840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163841",
        "url": "https://bugzilla.suse.com/1163841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163842",
        "url": "https://bugzilla.suse.com/1163842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163843",
        "url": "https://bugzilla.suse.com/1163843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163844",
        "url": "https://bugzilla.suse.com/1163844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163845",
        "url": "https://bugzilla.suse.com/1163845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163846",
        "url": "https://bugzilla.suse.com/1163846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163849",
        "url": "https://bugzilla.suse.com/1163849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163850",
        "url": "https://bugzilla.suse.com/1163850"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163851",
        "url": "https://bugzilla.suse.com/1163851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163852",
        "url": "https://bugzilla.suse.com/1163852"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163853",
        "url": "https://bugzilla.suse.com/1163853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163855",
        "url": "https://bugzilla.suse.com/1163855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163856",
        "url": "https://bugzilla.suse.com/1163856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163857",
        "url": "https://bugzilla.suse.com/1163857"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163858",
        "url": "https://bugzilla.suse.com/1163858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163859",
        "url": "https://bugzilla.suse.com/1163859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163860",
        "url": "https://bugzilla.suse.com/1163860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163861",
        "url": "https://bugzilla.suse.com/1163861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163862",
        "url": "https://bugzilla.suse.com/1163862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163863",
        "url": "https://bugzilla.suse.com/1163863"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163867",
        "url": "https://bugzilla.suse.com/1163867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163869",
        "url": "https://bugzilla.suse.com/1163869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163880",
        "url": "https://bugzilla.suse.com/1163880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163971",
        "url": "https://bugzilla.suse.com/1163971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164051",
        "url": "https://bugzilla.suse.com/1164051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164069",
        "url": "https://bugzilla.suse.com/1164069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164098",
        "url": "https://bugzilla.suse.com/1164098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164115",
        "url": "https://bugzilla.suse.com/1164115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164314",
        "url": "https://bugzilla.suse.com/1164314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164315",
        "url": "https://bugzilla.suse.com/1164315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164388",
        "url": "https://bugzilla.suse.com/1164388"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164471",
        "url": "https://bugzilla.suse.com/1164471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164598",
        "url": "https://bugzilla.suse.com/1164598"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164632",
        "url": "https://bugzilla.suse.com/1164632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164705",
        "url": "https://bugzilla.suse.com/1164705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164712",
        "url": "https://bugzilla.suse.com/1164712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164727",
        "url": "https://bugzilla.suse.com/1164727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164728",
        "url": "https://bugzilla.suse.com/1164728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164729",
        "url": "https://bugzilla.suse.com/1164729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164730",
        "url": "https://bugzilla.suse.com/1164730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164731",
        "url": "https://bugzilla.suse.com/1164731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164732",
        "url": "https://bugzilla.suse.com/1164732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164733",
        "url": "https://bugzilla.suse.com/1164733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164734",
        "url": "https://bugzilla.suse.com/1164734"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164735",
        "url": "https://bugzilla.suse.com/1164735"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14615 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14897 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15213 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15213/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16746 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16746/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16994 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16994/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18808 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19036 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19045 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19051 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19066 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19318 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19318/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19319 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19319/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19332 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19332/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19338 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19338/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19447 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19447/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19523 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19523/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19526 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19526/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19527 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19527/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19532 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19532/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19533 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19533/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19535 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19535/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19537 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19537/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19767 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19927 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19927/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19965 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19966 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20095 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20096 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-7053 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-7053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8428 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8428/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-03-02T16:01:49Z",
      "generator": {
        "date": "2020-03-02T16:01:49Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:0560-1",
      "initial_release_date": "2020-03-02T16:01:49Z",
      "revision_history": [
        {
          "date": "2020-03-02T16:01:49Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.34.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.34.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-default-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-default-livepatch-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.34.1.aarch64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.34.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.34.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.34.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-197.34.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-197.34.1.noarch",
                  "product_id": "kernel-devel-4.12.14-197.34.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-197.34.1.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-197.34.1.noarch",
                  "product_id": "kernel-docs-4.12.14-197.34.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-197.34.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-197.34.1.noarch",
                  "product_id": "kernel-docs-html-4.12.14-197.34.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-197.34.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-197.34.1.noarch",
                  "product_id": "kernel-macros-4.12.14-197.34.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-197.34.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-197.34.1.noarch",
                  "product_id": "kernel-source-4.12.14-197.34.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-197.34.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-197.34.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-197.34.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.34.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-debug-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-debug-livepatch-devel-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-debug-livepatch-devel-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-default-livepatch-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.34.1.ppc64le",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.34.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.34.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.34.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.34.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.34.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.34.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-default-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-default-livepatch-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-syms-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-197.34.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.34.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.34.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.34.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.34.1.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.34.1.s390x",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.34.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.34.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.34.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-debug-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-debug-livepatch-devel-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-debug-livepatch-devel-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-default-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-default-livepatch-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.34.1.x86_64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.34.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.34.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.34.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
                  "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
                  "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:15:sp1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-197.34.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-197.34.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-197.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.34.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-197.34.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-197.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.34.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.34.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-197.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-197.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-197.34.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-197.34.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-197.34.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-197.34.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-4.12.14-197.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x"
        },
        "product_reference": "kernel-zfcpdump-4.12.14-197.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-197.34.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-197.34.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.34.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.34.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.34.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.34.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.34.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-197.34.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-197.34.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.34.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-197.34.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.34.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-197.34.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.34.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-197.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.34.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.34.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.34.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-4.12.14-197.34.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.34.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.34.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.34.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.34.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.34.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.34.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.34.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.34.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.34.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.34.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.34.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.34.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.34.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.34.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.34.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.34.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-4.12.14-197.34.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        },
        "product_reference": "kernel-default-extra-4.12.14-197.34.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-14615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14615",
          "url": "https://www.suse.com/security/cve/CVE-2019-14615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160195 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1160195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165881 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1165881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14615"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-14897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14897",
          "url": "https://www.suse.com/security/cve/CVE-2019-14897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157155 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1157155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160467 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14897"
    },
    {
      "cve": "CVE-2019-15213",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15213"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15213",
          "url": "https://www.suse.com/security/cve/CVE-2019-15213"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1146519"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146544 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1146544"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15213"
    },
    {
      "cve": "CVE-2019-16746",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16746"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16746",
          "url": "https://www.suse.com/security/cve/CVE-2019-16746"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1152107 for CVE-2019-16746",
          "url": "https://bugzilla.suse.com/1152107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173659 for CVE-2019-16746",
          "url": "https://bugzilla.suse.com/1173659"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-16746"
    },
    {
      "cve": "CVE-2019-16994",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16994"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16994",
          "url": "https://www.suse.com/security/cve/CVE-2019-16994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161523 for CVE-2019-16994",
          "url": "https://bugzilla.suse.com/1161523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16994"
    },
    {
      "cve": "CVE-2019-18808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18808",
          "url": "https://www.suse.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156259 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1156259"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18808"
    },
    {
      "cve": "CVE-2019-19036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19036",
          "url": "https://www.suse.com/security/cve/CVE-2019-19036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157692 for CVE-2019-19036",
          "url": "https://bugzilla.suse.com/1157692"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19036"
    },
    {
      "cve": "CVE-2019-19045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19045",
          "url": "https://www.suse.com/security/cve/CVE-2019-19045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161522 for CVE-2019-19045",
          "url": "https://bugzilla.suse.com/1161522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19045"
    },
    {
      "cve": "CVE-2019-19051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19051",
          "url": "https://www.suse.com/security/cve/CVE-2019-19051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159024 for CVE-2019-19051",
          "url": "https://bugzilla.suse.com/1159024"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19051"
    },
    {
      "cve": "CVE-2019-19054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19054",
          "url": "https://www.suse.com/security/cve/CVE-2019-19054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161518 for CVE-2019-19054",
          "url": "https://bugzilla.suse.com/1161518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19054"
    },
    {
      "cve": "CVE-2019-19066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19066",
          "url": "https://www.suse.com/security/cve/CVE-2019-19066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157303 for CVE-2019-19066",
          "url": "https://bugzilla.suse.com/1157303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19066"
    },
    {
      "cve": "CVE-2019-19318",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19318"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19318",
          "url": "https://www.suse.com/security/cve/CVE-2019-19318"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158026 for CVE-2019-19318",
          "url": "https://bugzilla.suse.com/1158026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19318"
    },
    {
      "cve": "CVE-2019-19319",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19319"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19319",
          "url": "https://www.suse.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158021 for CVE-2019-19319",
          "url": "https://bugzilla.suse.com/1158021"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19319"
    },
    {
      "cve": "CVE-2019-19332",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19332"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19332",
          "url": "https://www.suse.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158827 for CVE-2019-19332",
          "url": "https://bugzilla.suse.com/1158827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19332"
    },
    {
      "cve": "CVE-2019-19338",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19338"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19338",
          "url": "https://www.suse.com/security/cve/CVE-2019-19338"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158954 for CVE-2019-19338",
          "url": "https://bugzilla.suse.com/1158954"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19338"
    },
    {
      "cve": "CVE-2019-19447",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19447"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19447",
          "url": "https://www.suse.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158819 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1158819"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173869 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1173869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-19447"
    },
    {
      "cve": "CVE-2019-19523",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19523"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19523",
          "url": "https://www.suse.com/security/cve/CVE-2019-19523"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158823 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19523"
    },
    {
      "cve": "CVE-2019-19526",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19526"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19526",
          "url": "https://www.suse.com/security/cve/CVE-2019-19526"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19526",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19526",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158893 for CVE-2019-19526",
          "url": "https://bugzilla.suse.com/1158893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19526"
    },
    {
      "cve": "CVE-2019-19527",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19527"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19527",
          "url": "https://www.suse.com/security/cve/CVE-2019-19527"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158900 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19527"
    },
    {
      "cve": "CVE-2019-19532",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19532"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19532",
          "url": "https://www.suse.com/security/cve/CVE-2019-19532"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158823 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158824 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19532"
    },
    {
      "cve": "CVE-2019-19533",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19533"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19533",
          "url": "https://www.suse.com/security/cve/CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19533",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19533",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19533"
    },
    {
      "cve": "CVE-2019-19535",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19535"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19535",
          "url": "https://www.suse.com/security/cve/CVE-2019-19535"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158903 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19535"
    },
    {
      "cve": "CVE-2019-19537",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19537"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19537",
          "url": "https://www.suse.com/security/cve/CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158904 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158904"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19537"
    },
    {
      "cve": "CVE-2019-19767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19767",
          "url": "https://www.suse.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159297 for CVE-2019-19767",
          "url": "https://bugzilla.suse.com/1159297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19767"
    },
    {
      "cve": "CVE-2019-19927",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19927"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19927",
          "url": "https://www.suse.com/security/cve/CVE-2019-19927"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160147 for CVE-2019-19927",
          "url": "https://bugzilla.suse.com/1160147"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19927"
    },
    {
      "cve": "CVE-2019-19965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19965",
          "url": "https://www.suse.com/security/cve/CVE-2019-19965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159911 for CVE-2019-19965",
          "url": "https://bugzilla.suse.com/1159911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19965"
    },
    {
      "cve": "CVE-2019-19966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19966",
          "url": "https://www.suse.com/security/cve/CVE-2019-19966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159841 for CVE-2019-19966",
          "url": "https://bugzilla.suse.com/1159841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19966"
    },
    {
      "cve": "CVE-2019-20054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20054",
          "url": "https://www.suse.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159910 for CVE-2019-20054",
          "url": "https://bugzilla.suse.com/1159910"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20054"
    },
    {
      "cve": "CVE-2019-20095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20095",
          "url": "https://www.suse.com/security/cve/CVE-2019-20095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159909 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159914 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-20095"
    },
    {
      "cve": "CVE-2019-20096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20096",
          "url": "https://www.suse.com/security/cve/CVE-2019-20096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159908 for CVE-2019-20096",
          "url": "https://bugzilla.suse.com/1159908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20096"
    },
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-7053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-7053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-7053",
          "url": "https://www.suse.com/security/cve/CVE-2020-7053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160966 for CVE-2020-7053",
          "url": "https://bugzilla.suse.com/1160966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-7053"
    },
    {
      "cve": "CVE-2020-8428",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8428"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8428",
          "url": "https://www.suse.com/security/cve/CVE-2020-8428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162109 for CVE-2020-8428",
          "url": "https://bugzilla.suse.com/1162109"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8428"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_34-default-1-3.5.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.34.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.34.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.34.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T16:01:49Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    }
  ]
}
  suse-su-2020:0559-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": " The SUSE Linux Enterprise 12 SP4 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).\n- CVE-2020-8992: An issue was discovered in ext4_protect_reserved_inode in fs/ext4/block_validity.c that allowed attackers to cause a soft lockup via a crafted journal size (bnc#1164069).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).\n- CVE-2020-8428: There was a use-after-free bug in fs/namei.c, which allowed local users to cause a denial of service or possibly obtain sensitive information from kernel memory (bnc#1162109).\n- CVE-2020-7053: There was a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c (bnc#1160966).\n- CVE-2019-19045: A memory leak in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures (bnc#1161522).\n- CVE-2019-16994: A memory leak existed in sit_init_net() in net/ipv6/sit.c which might have caused denial of service (bnc#1161523).\n- CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures (bnc#1161518).\n- CVE-2019-14896: A heap overflow was found in the add_ie_rates() function of the Marvell Wifi Driver (bsc#1157157).\n- CVE-2019-14897: A stack overflow was found in the lbs_ibss_join_existing() function of the Marvell Wifi Driver (bsc#1157155).\n- CVE-2019-19318: Mounting a crafted btrfs image twice could have caused a use-after-free (bnc#1158026).\n- CVE-2019-19036: An issue discovered in btrfs_root_node in fs/btrfs/ctree.c allowed a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero (bnc#1157692).\n- CVE-2019-14615: An information disclosure vulnerability existed due to insufficient control flow in certain data structures for some Intel(R) Processors (bnc#1160195).\n- CVE-2019-19965: There was a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).\n- CVE-2019-20095: Fixed a memory leak and denial of service in mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c, where some error-handling cases did not free allocated hostcmd memory (bnc#1159909).\n- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c related to put_links (bnc#1159910).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).\n- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting could have led to a use-after-free in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19319: A setxattr operation, after a mount of a crafted ext4 image, could cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).\n- CVE-2019-19767: The Linux kernel mishandled ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).\n- CVE-2019-18808: A memory leak in the ccp_run_sha_cmd() in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption) (bnc#1156259).\n- CVE-2019-19066: A memory leak in the bfad_im_get_stats() in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures (bnc#1157303).\n\nThe following non-security bugs were fixed:\n\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- ACPI: PM: Avoid attaching ACPI PM domain to certain devices (bsc#1051510).\n- ACPI / video: Add force_none quirk for Dell OptiPlex 9020M (bsc#1051510).\n- ACPI: video: Do not export a non working backlight interface on MSI MS-7721 boards (bsc#1051510).\n- ACPI: watchdog: Allow disabling WDAT at boot (bsc#1162557).\n- ACPI / watchdog: Fix init failure with overlapping register regions (bsc#1162557).\n- ACPI / watchdog: Set default timeout in probe (bsc#1162557).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).\n- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: hda/realtek - Fix silent output on MSI-GL73 (git-fixes).\n- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).\n- ALSA: hda: Reset stream if DMA RUN bit not cleared (bsc#1111666).\n- ALSA: hda: Use scnprintf() for printing texts for sysfs/procfs (git-fixes).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: seq: Avoid concurrent access to queue flags (git-fixes).\n- ALSA: seq: Fix concurrent access to queue current tick/time (git-fixes).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: usb-audio: Apply sample rate quirk for Audioengine D1 (git-fixes).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- apparmor: fix unsigned len comparison with less than zero (git-fixes).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: cs4349: Use PM ops \u0027cs4349_runtime_pm\u0027 (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: sun8i-codec: Fix setting DAI data format (git-fixes).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ata: ahci: Add shutdown to freeze hardware resources of ahci (bsc#1164388).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front() (bsc#1163762).\n- bcache: add code comments for state-\u003epool in __btree_sort() (bsc#1163762).\n- bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n- bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n- bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n- bcache: add more accurate error messages in read_super() (bsc#1163762).\n- bcache: add readahead cache policy options via sysfs interface (bsc#1163762).\n- bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (bsc#1163762).\n- bcache: check return value of prio_read() (bsc#1163762).\n- bcache: deleted code comments for dead code in bch_data_insert_keys() (bsc#1163762).\n- bcache: do not export symbols (bsc#1163762).\n- bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n- bcache: fix a lost wake-up problem caused by mca_cannibalize_lock (bsc#1163762).\n- bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n- bcache: fix deadlock in bcache_allocator (bsc#1163762).\n- bcache: fix incorrect data type usage in btree_flush_write() (bsc#1163762).\n- bcache: fix memory corruption in bch_cache_accounting_clear() (bsc#1163762).\n- bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n- bcache: ignore pending signals when creating gc and allocator thread (bsc#1163762, bsc#1112504).\n- bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n- bcache: reap c-\u003ebtree_cache_freeable from the tail in bch_mca_scan() (bsc#1163762).\n- bcache: reap from tail of c-\u003ebtree_cache in bch_mca_scan() (bsc#1163762).\n- bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n- bcache: remove member accessed from struct btree (bsc#1163762).\n- bcache: remove the extra cflags for request.o (bsc#1163762).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (bsc#1163762, bsc#1112504).\n- bcma: remove set but not used variable \u0027sizel\u0027 (git-fixes).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840).\n- blk-mq: make sure that line break can be printed (bsc#1164098).\n- Bluetooth: Fix race condition in hci_release_sock() (bsc#1051510).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).\n- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- Btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- Btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- Btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- Btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- Btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- Btrfs: do not double lock the subvol_sem for rename exchange (bsc#1162943).\n- Btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- Btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- Btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- Btrfs: fix infinite loop during fsync after rename operations (bsc#1163383).\n- Btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- Btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- Btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- Btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- Btrfs: fix race between adding and putting tree mod seq elements and nodes (bsc#1163384).\n- Btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- Btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- Btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- Btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- Btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- Btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- Btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- Btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- Btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- Btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- Btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- Btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n- Btrfs: skip log replay on orphaned roots (bsc#1161935).\n- Btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- Btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- Btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- Btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- Btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- Btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- Btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- Btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- Btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- Btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1051510).\n- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n- cdrom: respect device capabilities during opening action (boo#1164632).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cgroup: pids: use atomic64_t for pids-\u003elimit (bsc#1161514).\n- chardev: Avoid potential use-after-free in \u0027chrdev_open()\u0027 (bsc#1163849).\n- cifs: add support for flock (bsc#1144333).\n- CIFS: Close cached root handle only if it had a lease (bsc#1144333).\n- CIFS: Close open handle after interrupted close (bsc#1144333).\n- CIFS: close the shared root handle on tree disconnect (bsc#1144333).\n- CIFS: Do not miss cancelled OPEN responses (bsc#1144333).\n- CIFS: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- CIFS: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- CIFS: fix mount option display for sec=krb5i (bsc#1161907).\n- CIFS: Fix mount options set in automount (bsc#1144333).\n- CIFS: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- CIFS: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- CIFS: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- CIFS: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- CIFS: Properly process SMB3 lease breaks (bsc#1144333).\n- CIFS: remove set but not used variables \u0027cinode\u0027 and \u0027netfid\u0027 (bsc#1144333).\n- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: mmp2: Fix the order of timer mux parents (bsc#1051510).\n- clk: qcom: rcg2: Do not crash if our parent can\u0027t be found; return an error (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: sunxi-ng: add mux and pll notifiers for A64 CPU clock (bsc#1051510).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clk: tegra: Mark fuse clock as critical (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource: Prevent double add_timer_on() for watchdog_timer (bsc#1051510).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- configfs_register_group() shouldn\u0027t be (and isn\u0027t) called in rmdirable parts (bsc#1051510).\n- copy/pasted \u0027Recommends:\u0027 instead of \u0027Provides:\u0027, \u0027Obsoletes:\u0027 and \u0027Conflicts:\n- Cover up kABI breakage due to DH key verification (bsc#1155331).\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn-\u003ealg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: dh - add public key verification test (bsc#1155331).\n- crypto: dh - fix calculating encoded key size (bsc#1155331).\n- crypto: dh - fix memory leak (bsc#1155331).\n- crypto: dh - update test for public key verification (bsc#1155331).\n- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n- crypto: ecdh - add public key verification test (bsc#1155331).\n- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- Documentation: Document arm64 kpti control (bsc#1162623).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915: Add missing include file \u0026lt;linux/math64.h\u003e (bsc#1051510).\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- e1000e: Add support for Comet Lake (bsc#1158533).\n- e1000e: Add support for Tiger Lake (bsc#1158533).\n- e1000e: Increase pause and refresh time (bsc#1158533).\n- e100: Fix passing zero to \u0027PTR_ERR\u0027 warning in e100_load_ucode_wait (bsc#1051510).\n- Enable CONFIG_BLK_DEV_SR_VENDOR (boo#1164632).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- ext2: check err when partial != NULL (bsc#1163859).\n- ext4: check for directory entries too close to block end (bsc#1163861).\n- ext4: fix a bug in ext4_wait_for_tail_page_commit (bsc#1163841).\n- ext4: fix checksum errors with indexed dirs (bsc#1160979).\n- ext4: fix deadlock allocating crypto bounce page from mempool (bsc#1163842).\n- ext4: Fix mount failure with quota configured as module (bsc#1164471).\n- ext4: improve explanation of a mount failure caused by a misconfigured kernel (bsc#1163843).\n- ext4, jbd2: ensure panic when aborting with zero errno (bsc#1163853).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- firestream: fix memory leaks (bsc#1051510).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- Fix partial checked out tree build ... so that bisection does not break.\n- Fix the locking in dcache_readdir() and friends (bsc#1123328).\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- fscrypt: do not set policy for a dead directory (bsc#1163846).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/open.c: allow opening only regular files during execve() (bsc#1163845).\n- ftrace: Add comment to why rcu_dereference_sched() is open coded (git-fixes).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- ftrace: Protect ftrace_graph_hash with ftrace_sync (git-fixes).\n- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- gtp: avoid zero size hashtable (networking-stable-20_01_01).\n- gtp: do not allow adding duplicate tid and ms_addr pdp context (networking-stable-20_01_01).\n- gtp: fix an use-after-free in ipv4_pdp_find() (networking-stable-20_01_01).\n- gtp: fix wrong condition in gtp_genl_dump_pdp() (networking-stable-20_01_01).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- hwmon: (pmbus/ltc2978) Fix PMBus polling of MFR_COMMON definitions (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- init: add arch_call_rest_init to allow stack switching (jsc#SLE-11179).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- iommu/amd: Fix IOMMU perf counter clobbering during init (bsc#1162617).\n- iommu/arm-smmu-v3: Populate VMID field for CMDQ_OP_TLBI_NH_VA (bsc#1164314).\n- iommu/io-pgtable-arm: Fix race handling in split_blk_unmap() (bsc#1164115).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: do not throw error when trying to remove IGTK (bsc#1051510).\n- iwlwifi: mvm: fix NVM check for 3168 devices (bsc#1051510).\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- jbd2: clear JBD2_ABORT flag before journal_reset to update log tail info when load journal (bsc#1163862).\n- jbd2: do not clear the BH_Mapped flag when forgetting a metadata buffer (bsc#1163836).\n- jbd2: Fix possible overflow in jbd2_log_space_left() (bsc#1163860).\n- jbd2: make sure ESHUTDOWN to be recorded in the journal superblock (bsc#1163863).\n- jbd2: move the clearing of b_modified flag to the journal_unmap_buffer() (bsc#1163880).\n- jbd2: switch to use jbd2_journal_abort() when failed to submit the commit record (bsc#1163852).\n- kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n- kABI: protect struct sctp_ep_common (kabi).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kconfig: fix broken dependency in randconfig-generated .config (bsc#1051510).\n- kernel-binary.spec.in: do not recommend firmware for kvmsmall and azure flavor (boo#1161360).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n- kexec: bail out upon SIGKILL when allocating memory (git-fixes).\n- KVM: Clean up __kvm_gfn_to_hva_cache_init() and its callers (bsc#1133021).\n- KVM: fix spectrev1 gadgets (bsc#1164705).\n- KVM: PPC: Book3S HV: Uninit vCPU if vcore creation fails (bsc#1061840).\n- KVM: PPC: Book3S PR: Fix -Werror=return-type build failure (bsc#1061840).\n- KVM: PPC: Book3S PR: Free shared page if mmu initialization fails (bsc#1061840).\n- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).\n- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).\n- KVM: SVM: Override default MMIO mask if memory encryption is enabled (bsc#1162618).\n- KVM: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).\n- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).\n- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).\n- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).\n- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).\n- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).\n- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).\n- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).\n- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).\n- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).\n- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- lib: crc64: include \u0026lt;linux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- livepatch: Simplify stack trace retrieval (jsc#SLE-11179).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- mac80211: Fix TKIP replay protection immediately after key setup (bsc#1051510).\n- mac80211: mesh: restrict airtime metric to peered established plinks (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- media: af9005: uninitialized variable printked (bsc#1051510).\n- media: cec: CEC 2.0-only bcast messages were ignored (git-fixes).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: digitv: do not continue if remote control state can\u0027t be read (bsc#1051510).\n- media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0 (bsc#1051510).\n- media: exynos4-is: fix wrong mdev and v4l2 dev order in error path (git-fixes).\n- media: gspca: zero usb_buf (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov6650: Fix crop rectangle alignment not passed back (git-fixes).\n- media: ov6650: Fix incorrect use of JPEG colorspace (git-fixes).\n- media: pulse8-cec: fix lost cec_transmit_attempt_done() call.\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media/v4l2-core: set pages dirty upon releasing DMA buffers (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- mfd: da9062: Fix watchdog compatible string (bsc#1051510).\n- mfd: dln2: More sanity checking for endpoints (bsc#1051510).\n- mfd: rn5t618: Mark ADC control register volatile (bsc#1051510).\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: Revert \u0027mmc: sdhci-of-esdhc: add erratum A-009204 support\u0027 (bsc#1051510).\n- mmc: spi: Toggle SPI polarity, do not hardcode it (bsc#1051510).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mod_devicetable: fix PHY module format (networking-stable-19_12_28).\n- mtd: fix mtd_oobavail() incoherent returned value (bsc#1051510).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1163851).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n- net: dst: Force 4-byte alignment of dst_metrics (networking-stable-19_12_28).\n- net: ena: fix napi handler misbehavior when the napi budget is zero (networking-stable-20_01_01).\n- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n- net: hisilicon: Fix a BUG trigered by wrong bytes_compl (networking-stable-19_12_28).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net: nfc: nci: fix a possible sleep-in-atomic-context bug in nci_uart_tty_receive() (networking-stable-19_12_28).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: qlogic: Fix error paths in ql_alloc_large_buffers() (networking-stable-19_12_28).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net: sched: correct flower port blocking (git-fixes).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net: usb: lan78xx: Fix suspend/resume PHY register access error (networking-stable-19_12_28).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- NFC: fdp: fix incorrect free object (networking-stable-19_11_10).\n- NFC: pn533: fix bulk-message timeout (bsc#1051510).\n- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- NFC: st21nfca: fix double free (networking-stable-19_11_10).\n- nvme: fix the parameter order for nvme_get_log in nvme_get_fw_slot_info (bsc#1163774).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- PCI: Add DMA alias quirk for Intel VCA NTB (bsc#1051510).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI/IOV: Fix memory leak in pci_iov_add_virtfn() (git-fixes).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1114279).\n- perf/x86/intel: Fix inaccurate period in context switch for auto-reload (bsc#1164315).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc: avoid adjusting memory_limit for capture kernel memory reservation (bsc#1140025 ltc#176086).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/livepatch: return -ERRNO values in save_stack_trace_tsk_reliable() (bsc#1071995 bsc#1161875).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/pseries: Advance pfn if section is not present in lmb_is_removable() (bsc#1065729).\n- powerpc/pseries: Allow not having ibm, hypertas-functions::hcall-multi-tce for DDW (bsc#1065729).\n- powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init() (git-fixes).\n- powerpc/pseries/hotplug-memory: Change rc variable to bool (bsc#1065729).\n- powerpc/pseries/lparcfg: Fix display of Maximum Memory (bsc#1162028 ltc#181740).\n- powerpc/pseries/vio: Fix iommu_table use-after-free refcount warning (bsc#1065729).\n- powerpc: reserve memory for capture kernel after hugepages init (bsc#1140025 ltc#176086).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- power: supply: ltc2941-battery-gauge: fix use-after-free (bsc#1051510).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- pwm: omap-dmtimer: Remove PWM chip in .remove before making it unfunctional (git-fixes).\n- pwm: Remove set but not set variable \u0027pwm\u0027 (git-fixes).\n- pxa168fb: Fix the function used to release some memory in an error (bsc#1114279)\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qede: Fix multicast mac configuration (networking-stable-19_12_28).\n- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).\n- qmi_wwan: Add support for Quectel RM500Q (bsc#1051510).\n- quota: Check that quota is not dirty before release (bsc#1163858).\n- quota: fix livelock in dquot_writeback_dquots (bsc#1163857).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- r8152: get default setting of WOL before initializing (bsc#1051510).\n- random: move FIPS continuous test to output functions (bsc#1155334).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- RDMA/hns: Prevent memory leaks of eq-\u003ebuf_list (bsc#1104427 ).\n- README.BRANCH: Update the branch name to cve/linux-4.12\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- reiserfs: Fix memory leak of journal device string (bsc#1163867).\n- reiserfs: Fix spurious unlock in reiserfs_fill_super() error handling (bsc#1163869).\n- resource: fix locking in find_next_iomem_res() (bsc#1114279).\n- Revert \u0027ath10k: fix DMA related firmware crashes on multiple devices\u0027 (git-fixes).\n- Revert \u0027Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers\u0027 (bsc#1051510).\n- Revert \u0027mmc: sdhci: Fix incorrect switch to HS mode\u0027 (bsc#1051510).\n- rpm/kabi.pl: support new (\u003e=5.4) Module.symvers format (new symbol namespace field)\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages\n- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n- rpm/kernel-subpackage-spec: fix kernel-default-base build There were some issues with recent changes to subpackage dependencies handling:\n- rpm/kernel-subpackage-spec: Unify dependency handling.\n- rpm/modules.fips: update module list (bsc#1157853)\n- rsi_91x_usb: fix interface sanity check (git-fixes).\n- rtc: cmos: Stop using shared IRQ (bsc#1051510).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: hym8563: Return -EINVAL if the time is known to be invalid (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in \u0027max8997_rtc_read_alarm()\u0027 (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf\u0027s type to u8 in s35390a_init (bsc#1051510).\n- rtl8xxxu: fix interface sanity check (git-fixes).\n- rtlwifi: Fix MAX MPDU of VHT capability (git-fixes).\n- rtlwifi: Remove redundant semicolon in wifi.h (git-fixes).\n- s390: add stack switch helper (jsc#SLE-11179).\n- s390: add support for virtually mapped kernel stacks (jsc#SLE-11179).\n- s390: always inline current_stack_pointer() (jsc#SLE-11179).\n- s390: always inline disabled_wait (jsc#SLE-11179).\n- s390: avoid misusing CALL_ON_STACK for task stack setup (jsc#SLE-11179).\n- s390: clean up stacks setup (jsc#SLE-11179).\n- s390: correct CALL_ON_STACK back_chain saving (jsc#SLE-11179).\n- s390: disable preemption when switching to nodat stack with CALL_ON_STACK (jsc#SLE-11179).\n- s390: fine-tune stack switch helper (jsc#SLE-11179).\n- s390: fix register clobbering in CALL_ON_STACK (jsc#SLE-11179).\n- s390/ftrace: generate traced function stack frame (jsc#SLE-11178 jsc#SLE-11179).\n- s390/ftrace: save traced function caller (jsc#SLE-11179).\n- s390/ftrace: use HAVE_FUNCTION_GRAPH_RET_ADDR_PTR (jsc#SLE-11179).\n- s390/head64: correct init_task stack setup (jsc#SLE-11179).\n- s390: kabi workaround for ftrace_ret_stack (jsc#SLE-11179).\n- s390: kabi workaround for lowcore changes due to vmap stack (jsc#SLE-11179).\n- s390: kabi workaround for reliable stack tracing (jsc#SLE-11179).\n- s390/kasan: avoid false positives during stack unwind (jsc#SLE-11179).\n- s390/kasan: avoid report in get_wchan (jsc#SLE-11179).\n- s390/livepatch: Implement reliable stack tracing for the consistency model (jsc#SLE-11179).\n- s390: preserve kabi for stack unwind API (jsc#SLE-11179).\n- s390/process: avoid custom stack unwinding in get_wchan (jsc#SLE-11179).\n- s390/qeth: clean up page frag creation (git-fixes).\n- s390/qeth: consolidate skb allocation (git-fixes).\n- s390/qeth: ensure linear access to packet headers (git-fixes).\n- s390/qeth: guard against runt packets (git-fixes).\n- s390/stacktrace: use common arch_stack_walk infrastructure (jsc#SLE-11179).\n- s390/suspend: fix stack setup in swsusp_arch_suspend (jsc#SLE-11179).\n- s390/test_unwind: print verbose unwinding results (jsc#SLE-11179).\n- s390: unify stack size definitions (jsc#SLE-11179).\n- s390/unwind: add stack pointer alignment sanity checks (jsc#SLE-11179).\n- s390/unwind: always inline get_stack_pointer (jsc#SLE-11179).\n- s390/unwind: avoid int overflow in outside_of_stack (jsc#SLE-11179).\n- s390/unwind: cleanup unused READ_ONCE_TASK_STACK (jsc#SLE-11179).\n- s390/unwind: correct stack switching during unwind (jsc#SLE-11179).\n- s390/unwind: drop unnecessary code around calling ftrace_graph_ret_addr() (jsc#SLE-11179).\n- s390/unwind: filter out unreliable bogus %r14 (jsc#SLE-11179).\n- s390/unwind: fix get_stack_pointer(NULL, NULL) (jsc#SLE-11179).\n- s390/unwind: fix mixing regs and sp (jsc#SLE-11179).\n- s390/unwind: introduce stack unwind API (jsc#SLE-11179).\n- s390/unwind: make reuse_sp default when unwinding pt_regs (jsc#SLE-11179).\n- s390/unwind: remove stack recursion warning (jsc#SLE-11179).\n- s390/unwind: report an error if pt_regs are not on stack (jsc#SLE-11179).\n- s390/unwind: start unwinding from reliable state (jsc#SLE-11179).\n- s390/unwind: stop gracefully at task pt_regs (jsc#SLE-11179).\n- s390/unwind: stop gracefully at user mode pt_regs in irq stack (jsc#SLE-11179).\n- s390/unwind: unify task is current checks (jsc#SLE-11179).\n- sched/fair: Add tmp_alone_branch assertion (bnc#1156462).\n- sched/fair: Fix insertion in rq-\u003eleaf_cfs_rq_list (bnc#1156462).\n- sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).\n- sched/fair: Optimize update_blocked_averages() (bnc#1156462).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Fix a NULL pointer dereference in an error path (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix unbound NVME response length (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- scsi: zfcp: trace channel log even for FCP command responses (git-fixes).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- sctp: fully initialize v4 addr in some functions (networking-stable-19_12_28).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- SMB3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- SMB3: Fix persistent handles reconnect (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: remove confusing dmesg when mounting with encryption (\u0027seal\u0027) (bsc#1144333).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- soc/tegra: fuse: Correct straps\u0027 address for older Tegra124 device trees (bsc#1051510).\n- soc: ti: wkup_m3_ipc: Fix race condition with rproc_boot (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- sr_vendor: support Beurer GL50 evo CD-on-a-chip devices (boo#1164632).\n- stacktrace: Do not skip first entry on noncurrent tasks (jsc#SLE-11179).\n- stacktrace: Force USER_DS for stack_trace_save_user() (jsc#SLE-11179).\n- stacktrace: Get rid of unneeded \u0027!!\u0027 pattern (jsc#SLE-11179).\n- stacktrace: Provide common infrastructure (jsc#SLE-11179).\n- stacktrace: Provide helpers for common stack trace operations (jsc#SLE-11179).\n- stacktrace: Unbreak stack_trace_save_tsk_reliable() (jsc#SLE-11179).\n- stacktrace: Use PF_KTHREAD to check for kernel threads (jsc#SLE-11179).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- Staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: vt6656: correct packet types for CTS protect, mode (bsc#1051510).\n- staging: vt6656: Fix false Tx excessive retries reporting (bsc#1051510).\n- staging: vt6656: use NULLFUCTION stack on mac80211 (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- stop_machine: Atomically queue and wake stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption after queueing stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption when waking two stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810, bsc#1161702).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1160560).\n- tcp: do not send empty skb from tcp_write_xmit() (networking-stable-20_01_01).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- tracing: Annotate ftrace_graph_hash pointer with __rcu (git-fixes).\n- tracing: Annotate ftrace_graph_notrace_hash pointer with __rcu (git-fixes).\n- tracing: Cleanup stack trace code (jsc#SLE-11179).\n- tracing: Fix tracing_stat return values in error handling paths (git-fixes).\n- tracing: Fix very unlikely race of registering two stat tracers (git-fixes).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- ubifs: do not trigger assertion on invalid no-key filename (bsc#1163850).\n- ubifs: Fix deadlock in concurrent bulk-read and writepage (bsc#1163856).\n- ubifs: Fix FS_IOC_SETFLAGS unexpectedly clearing encrypt flag (bsc#1163855).\n- ubifs: Reject unsupported ioctl flags explicitly (bsc#1163844).\n- udp: fix integer overflow while computing available space in sk_rcvbuf (networking-stable-20_01_01).\n- USB: adutux: fix interface sanity check (bsc#1051510).\n- USB: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- USB: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- USB: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- USB: core: fix check for duplicate endpoints (git-fixes).\n- USB: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- USB: core: urb: fix URB structure initialization function (bsc#1051510).\n- USB: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- USB: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- USB: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- USB: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- USB: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- USB: EHCI: Do not return -EPIPE when hub is disconnected (git-fixes).\n- USB: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: legacy: set max_speed to super-speed (bsc#1051510).\n- USB: gadget: pch_udc: fix use after free (bsc#1051510).\n- USB: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- USB: gadget: Zero ffs_io_data (bsc#1051510).\n- USB: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- USB: idmouse: fix interface sanity checks (bsc#1051510).\n- usbip: Fix error path of vhci_recv_ret_submit() (git-fixes).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- USB: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n- USB: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- USB: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- USB: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- USB: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- USB: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- USB: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n- USB: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- USB: serial: io_edgeport: use irqsave() in USB\u0027s complete callback (bsc#1051510).\n- USB: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- USB: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- USB: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- USB: serial: keyspan: handle unbound ports (bsc#1051510).\n- USB: serial: opticon: fix control-message timeouts (bsc#1051510).\n- USB: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- USB: serial: option: add support for Quectel RM500Q in QDL mode (git-fixes).\n- USB: serial: option: add Telit ME910G1 0x110a composition (git-fixes).\n- USB: serial: option: add ZLP support for 0x1bc7/0x9010 (git-fixes).\n- USB: serial: quatech2: handle unbound ports (bsc#1051510).\n- USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- USB: serial: suppress driver bind attributes (bsc#1051510).\n- usb-storage: Disable UAS on JMicron SATA enclosure (bsc#1051510).\n- USB: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- USB: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- USB: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- USB: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- USB: xhci: only set D3hot for pci device (bsc#1051510).\n- vhost/vsock: accept only packets with the right dst_cid (networking-stable-20_01_01).\n- watchdog: max77620_wdt: fix potential build errors (bsc#1051510).\n- watchdog: rn5t618_wdt: fix module aliases (bsc#1051510).\n- watchdog: wdat_wdt: fix get_timeleft call for wdat_wdt (bsc#1162557).\n- wireless: fix enabling channel 12 for custom regulatory domain (bsc#1051510).\n- wireless: wext: avoid gcc -O3 warning (bsc#1051510).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/cpu: Update cached HLE state on write to TSX_CTRL_CPUID_CLEAR (bsc#1162619).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/MCE/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/MCE: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/resctrl: Check monitoring static key in the MBM overflow handler (bsc#1114279).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free when deleting resource groups (bsc#1114279).\n- xen/balloon: Support xend-based toolstack take two (bsc#1065600).\n- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xen: Enable interrupts when calling _cond_resched() (bsc#1065600).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-559,SUSE-SLE-SERVER-12-SP4-2020-559",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0559-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:0559-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200559-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:0559-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1046303",
        "url": "https://bugzilla.suse.com/1046303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050244",
        "url": "https://bugzilla.suse.com/1050244"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051858",
        "url": "https://bugzilla.suse.com/1051858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061840",
        "url": "https://bugzilla.suse.com/1061840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085030",
        "url": "https://bugzilla.suse.com/1085030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086301",
        "url": "https://bugzilla.suse.com/1086301"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086313",
        "url": "https://bugzilla.suse.com/1086313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086314",
        "url": "https://bugzilla.suse.com/1086314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088810",
        "url": "https://bugzilla.suse.com/1088810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104427",
        "url": "https://bugzilla.suse.com/1104427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1105392",
        "url": "https://bugzilla.suse.com/1105392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111666",
        "url": "https://bugzilla.suse.com/1111666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112504",
        "url": "https://bugzilla.suse.com/1112504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118338",
        "url": "https://bugzilla.suse.com/1118338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1123328",
        "url": "https://bugzilla.suse.com/1123328"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127371",
        "url": "https://bugzilla.suse.com/1127371"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133147",
        "url": "https://bugzilla.suse.com/1133147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1134973",
        "url": "https://bugzilla.suse.com/1134973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1140025",
        "url": "https://bugzilla.suse.com/1140025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1143959",
        "url": "https://bugzilla.suse.com/1143959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144333",
        "url": "https://bugzilla.suse.com/1144333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151910",
        "url": "https://bugzilla.suse.com/1151910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151927",
        "url": "https://bugzilla.suse.com/1151927"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153917",
        "url": "https://bugzilla.suse.com/1153917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154243",
        "url": "https://bugzilla.suse.com/1154243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155331",
        "url": "https://bugzilla.suse.com/1155331"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155334",
        "url": "https://bugzilla.suse.com/1155334"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156259",
        "url": "https://bugzilla.suse.com/1156259"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156286",
        "url": "https://bugzilla.suse.com/1156286"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156462",
        "url": "https://bugzilla.suse.com/1156462"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157155",
        "url": "https://bugzilla.suse.com/1157155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157157",
        "url": "https://bugzilla.suse.com/1157157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157303",
        "url": "https://bugzilla.suse.com/1157303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157424",
        "url": "https://bugzilla.suse.com/1157424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157692",
        "url": "https://bugzilla.suse.com/1157692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157853",
        "url": "https://bugzilla.suse.com/1157853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157966",
        "url": "https://bugzilla.suse.com/1157966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158013",
        "url": "https://bugzilla.suse.com/1158013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158021",
        "url": "https://bugzilla.suse.com/1158021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158026",
        "url": "https://bugzilla.suse.com/1158026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158533",
        "url": "https://bugzilla.suse.com/1158533"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158819",
        "url": "https://bugzilla.suse.com/1158819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159028",
        "url": "https://bugzilla.suse.com/1159028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159271",
        "url": "https://bugzilla.suse.com/1159271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159297",
        "url": "https://bugzilla.suse.com/1159297"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159394",
        "url": "https://bugzilla.suse.com/1159394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159483",
        "url": "https://bugzilla.suse.com/1159483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159484",
        "url": "https://bugzilla.suse.com/1159484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159569",
        "url": "https://bugzilla.suse.com/1159569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159588",
        "url": "https://bugzilla.suse.com/1159588"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159841",
        "url": "https://bugzilla.suse.com/1159841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159908",
        "url": "https://bugzilla.suse.com/1159908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159909",
        "url": "https://bugzilla.suse.com/1159909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159910",
        "url": "https://bugzilla.suse.com/1159910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159911",
        "url": "https://bugzilla.suse.com/1159911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159955",
        "url": "https://bugzilla.suse.com/1159955"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160195",
        "url": "https://bugzilla.suse.com/1160195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160210",
        "url": "https://bugzilla.suse.com/1160210"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160211",
        "url": "https://bugzilla.suse.com/1160211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160218",
        "url": "https://bugzilla.suse.com/1160218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160433",
        "url": "https://bugzilla.suse.com/1160433"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160442",
        "url": "https://bugzilla.suse.com/1160442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160476",
        "url": "https://bugzilla.suse.com/1160476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160560",
        "url": "https://bugzilla.suse.com/1160560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160755",
        "url": "https://bugzilla.suse.com/1160755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160756",
        "url": "https://bugzilla.suse.com/1160756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160784",
        "url": "https://bugzilla.suse.com/1160784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160787",
        "url": "https://bugzilla.suse.com/1160787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160802",
        "url": "https://bugzilla.suse.com/1160802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160803",
        "url": "https://bugzilla.suse.com/1160803"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160804",
        "url": "https://bugzilla.suse.com/1160804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160917",
        "url": "https://bugzilla.suse.com/1160917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160966",
        "url": "https://bugzilla.suse.com/1160966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160979",
        "url": "https://bugzilla.suse.com/1160979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161087",
        "url": "https://bugzilla.suse.com/1161087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161360",
        "url": "https://bugzilla.suse.com/1161360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161514",
        "url": "https://bugzilla.suse.com/1161514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161518",
        "url": "https://bugzilla.suse.com/1161518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161522",
        "url": "https://bugzilla.suse.com/1161522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161523",
        "url": "https://bugzilla.suse.com/1161523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161549",
        "url": "https://bugzilla.suse.com/1161549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161552",
        "url": "https://bugzilla.suse.com/1161552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161674",
        "url": "https://bugzilla.suse.com/1161674"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161702",
        "url": "https://bugzilla.suse.com/1161702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161875",
        "url": "https://bugzilla.suse.com/1161875"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161907",
        "url": "https://bugzilla.suse.com/1161907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161931",
        "url": "https://bugzilla.suse.com/1161931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161933",
        "url": "https://bugzilla.suse.com/1161933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161934",
        "url": "https://bugzilla.suse.com/1161934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161935",
        "url": "https://bugzilla.suse.com/1161935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161936",
        "url": "https://bugzilla.suse.com/1161936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161937",
        "url": "https://bugzilla.suse.com/1161937"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162028",
        "url": "https://bugzilla.suse.com/1162028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162067",
        "url": "https://bugzilla.suse.com/1162067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162109",
        "url": "https://bugzilla.suse.com/1162109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162139",
        "url": "https://bugzilla.suse.com/1162139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162557",
        "url": "https://bugzilla.suse.com/1162557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162617",
        "url": "https://bugzilla.suse.com/1162617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162618",
        "url": "https://bugzilla.suse.com/1162618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162619",
        "url": "https://bugzilla.suse.com/1162619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162623",
        "url": "https://bugzilla.suse.com/1162623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162943",
        "url": "https://bugzilla.suse.com/1162943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163383",
        "url": "https://bugzilla.suse.com/1163383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163384",
        "url": "https://bugzilla.suse.com/1163384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163762",
        "url": "https://bugzilla.suse.com/1163762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163774",
        "url": "https://bugzilla.suse.com/1163774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163836",
        "url": "https://bugzilla.suse.com/1163836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163840",
        "url": "https://bugzilla.suse.com/1163840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163841",
        "url": "https://bugzilla.suse.com/1163841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163842",
        "url": "https://bugzilla.suse.com/1163842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163843",
        "url": "https://bugzilla.suse.com/1163843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163844",
        "url": "https://bugzilla.suse.com/1163844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163845",
        "url": "https://bugzilla.suse.com/1163845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163846",
        "url": "https://bugzilla.suse.com/1163846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163849",
        "url": "https://bugzilla.suse.com/1163849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163850",
        "url": "https://bugzilla.suse.com/1163850"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163851",
        "url": "https://bugzilla.suse.com/1163851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163852",
        "url": "https://bugzilla.suse.com/1163852"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163853",
        "url": "https://bugzilla.suse.com/1163853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163855",
        "url": "https://bugzilla.suse.com/1163855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163856",
        "url": "https://bugzilla.suse.com/1163856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163857",
        "url": "https://bugzilla.suse.com/1163857"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163858",
        "url": "https://bugzilla.suse.com/1163858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163859",
        "url": "https://bugzilla.suse.com/1163859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163860",
        "url": "https://bugzilla.suse.com/1163860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163861",
        "url": "https://bugzilla.suse.com/1163861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163862",
        "url": "https://bugzilla.suse.com/1163862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163863",
        "url": "https://bugzilla.suse.com/1163863"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163867",
        "url": "https://bugzilla.suse.com/1163867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163869",
        "url": "https://bugzilla.suse.com/1163869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163880",
        "url": "https://bugzilla.suse.com/1163880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163971",
        "url": "https://bugzilla.suse.com/1163971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164069",
        "url": "https://bugzilla.suse.com/1164069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164098",
        "url": "https://bugzilla.suse.com/1164098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164115",
        "url": "https://bugzilla.suse.com/1164115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164314",
        "url": "https://bugzilla.suse.com/1164314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164315",
        "url": "https://bugzilla.suse.com/1164315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164388",
        "url": "https://bugzilla.suse.com/1164388"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164471",
        "url": "https://bugzilla.suse.com/1164471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164632",
        "url": "https://bugzilla.suse.com/1164632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164705",
        "url": "https://bugzilla.suse.com/1164705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164712",
        "url": "https://bugzilla.suse.com/1164712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164727",
        "url": "https://bugzilla.suse.com/1164727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164728",
        "url": "https://bugzilla.suse.com/1164728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164729",
        "url": "https://bugzilla.suse.com/1164729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164730",
        "url": "https://bugzilla.suse.com/1164730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164731",
        "url": "https://bugzilla.suse.com/1164731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164732",
        "url": "https://bugzilla.suse.com/1164732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164733",
        "url": "https://bugzilla.suse.com/1164733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164734",
        "url": "https://bugzilla.suse.com/1164734"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164735",
        "url": "https://bugzilla.suse.com/1164735"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14615 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14897 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16994 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16994/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18808 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19036 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19045 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19066 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19318 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19318/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19319 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19319/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19447 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19447/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19767 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19965 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19966 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20095 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20096 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-7053 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-7053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8428 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8428/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-03-02T14:21:42Z",
      "generator": {
        "date": "2020-03-02T14:21:42Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:0559-1",
      "initial_release_date": "2020-03-02T14:21:42Z",
      "revision_history": [
        {
          "date": "2020-03-02T14:21:42Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-4.12.14-6.37.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-4.12.14-6.37.1.noarch",
                  "product_id": "kernel-devel-azure-4.12.14-6.37.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-4.12.14-6.37.1.noarch",
                "product": {
                  "name": "kernel-source-azure-4.12.14-6.37.1.noarch",
                  "product_id": "kernel-source-azure-4.12.14-6.37.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-4.12.14-6.37.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-4.12.14-6.37.1.x86_64",
                  "product_id": "cluster-md-kmp-azure-4.12.14-6.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-4.12.14-6.37.1.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-4.12.14-6.37.1.x86_64",
                  "product_id": "dlm-kmp-azure-4.12.14-6.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-4.12.14-6.37.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-4.12.14-6.37.1.x86_64",
                  "product_id": "gfs2-kmp-azure-4.12.14-6.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-4.12.14-6.37.1.x86_64",
                "product": {
                  "name": "kernel-azure-4.12.14-6.37.1.x86_64",
                  "product_id": "kernel-azure-4.12.14-6.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-base-4.12.14-6.37.1.x86_64",
                "product": {
                  "name": "kernel-azure-base-4.12.14-6.37.1.x86_64",
                  "product_id": "kernel-azure-base-4.12.14-6.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-4.12.14-6.37.1.x86_64",
                "product": {
                  "name": "kernel-azure-devel-4.12.14-6.37.1.x86_64",
                  "product_id": "kernel-azure-devel-4.12.14-6.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-4.12.14-6.37.1.x86_64",
                "product": {
                  "name": "kernel-azure-extra-4.12.14-6.37.1.x86_64",
                  "product_id": "kernel-azure-extra-4.12.14-6.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-kgraft-devel-4.12.14-6.37.1.x86_64",
                "product": {
                  "name": "kernel-azure-kgraft-devel-4.12.14-6.37.1.x86_64",
                  "product_id": "kernel-azure-kgraft-devel-4.12.14-6.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-4.12.14-6.37.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-4.12.14-6.37.1.x86_64",
                  "product_id": "kernel-syms-azure-4.12.14-6.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-4.12.14-6.37.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-4.12.14-6.37.1.x86_64",
                  "product_id": "kselftests-kmp-azure-4.12.14-6.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-4.12.14-6.37.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-4.12.14-6.37.1.x86_64",
                  "product_id": "ocfs2-kmp-azure-4.12.14-6.37.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP4",
                  "product_id": "SUSE Linux Enterprise Server 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-4.12.14-6.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64"
        },
        "product_reference": "kernel-azure-4.12.14-6.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-base-4.12.14-6.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64"
        },
        "product_reference": "kernel-azure-base-4.12.14-6.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-4.12.14-6.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-4.12.14-6.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-4.12.14-6.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch"
        },
        "product_reference": "kernel-devel-azure-4.12.14-6.37.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-4.12.14-6.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch"
        },
        "product_reference": "kernel-source-azure-4.12.14-6.37.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-4.12.14-6.37.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
          "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-4.12.14-6.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-4.12.14-6.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64"
        },
        "product_reference": "kernel-azure-4.12.14-6.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-base-4.12.14-6.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64"
        },
        "product_reference": "kernel-azure-base-4.12.14-6.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-4.12.14-6.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64"
        },
        "product_reference": "kernel-azure-devel-4.12.14-6.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-4.12.14-6.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch"
        },
        "product_reference": "kernel-devel-azure-4.12.14-6.37.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-4.12.14-6.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch"
        },
        "product_reference": "kernel-source-azure-4.12.14-6.37.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-4.12.14-6.37.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-4.12.14-6.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-14615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14615",
          "url": "https://www.suse.com/security/cve/CVE-2019-14615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160195 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1160195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165881 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1165881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14615"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-14897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14897",
          "url": "https://www.suse.com/security/cve/CVE-2019-14897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157155 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1157155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160467 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14897"
    },
    {
      "cve": "CVE-2019-16994",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16994"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16994",
          "url": "https://www.suse.com/security/cve/CVE-2019-16994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161523 for CVE-2019-16994",
          "url": "https://bugzilla.suse.com/1161523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16994"
    },
    {
      "cve": "CVE-2019-18808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18808",
          "url": "https://www.suse.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156259 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1156259"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18808"
    },
    {
      "cve": "CVE-2019-19036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19036",
          "url": "https://www.suse.com/security/cve/CVE-2019-19036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157692 for CVE-2019-19036",
          "url": "https://bugzilla.suse.com/1157692"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19036"
    },
    {
      "cve": "CVE-2019-19045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19045",
          "url": "https://www.suse.com/security/cve/CVE-2019-19045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161522 for CVE-2019-19045",
          "url": "https://bugzilla.suse.com/1161522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19045"
    },
    {
      "cve": "CVE-2019-19054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19054",
          "url": "https://www.suse.com/security/cve/CVE-2019-19054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161518 for CVE-2019-19054",
          "url": "https://bugzilla.suse.com/1161518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19054"
    },
    {
      "cve": "CVE-2019-19066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19066",
          "url": "https://www.suse.com/security/cve/CVE-2019-19066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157303 for CVE-2019-19066",
          "url": "https://bugzilla.suse.com/1157303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19066"
    },
    {
      "cve": "CVE-2019-19318",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19318"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19318",
          "url": "https://www.suse.com/security/cve/CVE-2019-19318"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158026 for CVE-2019-19318",
          "url": "https://bugzilla.suse.com/1158026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19318"
    },
    {
      "cve": "CVE-2019-19319",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19319"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19319",
          "url": "https://www.suse.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158021 for CVE-2019-19319",
          "url": "https://bugzilla.suse.com/1158021"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19319"
    },
    {
      "cve": "CVE-2019-19447",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19447"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19447",
          "url": "https://www.suse.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158819 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1158819"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173869 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1173869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-19447"
    },
    {
      "cve": "CVE-2019-19767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19767",
          "url": "https://www.suse.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159297 for CVE-2019-19767",
          "url": "https://bugzilla.suse.com/1159297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19767"
    },
    {
      "cve": "CVE-2019-19965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19965",
          "url": "https://www.suse.com/security/cve/CVE-2019-19965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159911 for CVE-2019-19965",
          "url": "https://bugzilla.suse.com/1159911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19965"
    },
    {
      "cve": "CVE-2019-19966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19966",
          "url": "https://www.suse.com/security/cve/CVE-2019-19966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159841 for CVE-2019-19966",
          "url": "https://bugzilla.suse.com/1159841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19966"
    },
    {
      "cve": "CVE-2019-20054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20054",
          "url": "https://www.suse.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159910 for CVE-2019-20054",
          "url": "https://bugzilla.suse.com/1159910"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20054"
    },
    {
      "cve": "CVE-2019-20095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20095",
          "url": "https://www.suse.com/security/cve/CVE-2019-20095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159909 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159914 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-20095"
    },
    {
      "cve": "CVE-2019-20096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20096",
          "url": "https://www.suse.com/security/cve/CVE-2019-20096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159908 for CVE-2019-20096",
          "url": "https://bugzilla.suse.com/1159908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20096"
    },
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-7053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-7053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-7053",
          "url": "https://www.suse.com/security/cve/CVE-2020-7053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160966 for CVE-2020-7053",
          "url": "https://bugzilla.suse.com/1160966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-7053"
    },
    {
      "cve": "CVE-2020-8428",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8428"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8428",
          "url": "https://www.suse.com/security/cve/CVE-2020-8428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162109 for CVE-2020-8428",
          "url": "https://bugzilla.suse.com/1162109"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8428"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.37.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.37.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-02T14:21:42Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    }
  ]
}
  suse-su-2020:14354-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bsc#1167629).\n- CVE-2020-8647: There was a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).\n- CVE-2020-8649: There was a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).\n- CVE-2020-9383: An issue was discovered set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it (bsc#1165111).\n- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).\n- CVE-2020-11608: Fixed a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bsc#1168829).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).\n- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service or possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bsc#1157157).\n- CVE-2019-14897: A stack-based buffer overflow was found in the Marvell WiFi chip driver. An attacker is able to cause a denial of service or possibly execute arbitrary code, when a STA works in IBSS mode and connects to another STA (bsc#1157155).\n- CVE-2019-18675: Fixed an Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bsc#1157804).\n- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bsc#1159911).\n- CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service by triggering bfa_port_get_stats() failures (bsc#1157303).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bsc#1159908).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bsc#1159841).\n- CVE-2019-19532: Fixed multiple out-of-bounds write bugs that can be caused by a malicious USB device (bsc#1158824).\n- CVE-2019-19523: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bsc#115882).\n- CVE-2019-19537: Fixed a race condition that can be caused by a malicious USB device in the USB character device driver layer (bsc#1158904).\n- CVE-2019-19527, CVE-2019-19530, CVE-2019-19524: Fixed multiple use-after-free bug that could be caused by a malicious USB device (bsc#1158381, bsc#1158834, bsc#1158900).\n- CVE-2019-15213: Fixed a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bsc#1146544).\n- CVE-2019-19531: Fixed a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bsc#1158445).\n- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs (bsc#1157038).\n- CVE-2019-19227: Fixed a potential NULL pointer dereference in the AppleTalk subsystem (bsc#1157678).\n- CVE-2019-19074: Fixed a memory leak in the ath9k_wmi_cmd(), which allowed attackers to cause a denial of service (bsc#1157143).\n- CVE-2019-19073: Fixed multiple memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c, which allowed attackers to cause a denial of service (bsc#1157070).\n- CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which could cause denial of service (bsc#1149448).\n- CVE-2019-12456: Fixed a denial of service in _ctl_ioctl_main, which could be triggered by a local user (bsc#1136922).\n\nThe following non-security bugs were fixed:\n\n- Input: add safety guards to input_set_keycode() (bsc#1168075).\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- block: Fix oops scsi_disk_get() (bsc#1105327).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- kaiser: Fix for 32bit KAISER implementations (bsc#1157344).\n- klist: fix starting point removed bug in klist iterators (bsc#1156652).\n- kobject: Export kobject_get_unless_zero() (bsc#1105327).\n- kobject: fix kset_find_obj() race with concurrent last kobject_put() (bsc#1105327).\n- kref: minor cleanup (bsc#1105327).\n- media: ov519: add missing endpoint sanity checks (bsc#1168829).\n- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- sched: Fix race between task_group and sched_task_group (bsc#1136471).\n- sched: Remove lockdep check in sched_move_task() (bsc#1136471).\n- scsi: lpfc: Fix driver crash in target reset handler (bsc#1148871).\n- writeback: fix race that cause writeback hung (bsc#1161358).\n- x86: fix speculation bug reporting (bsc#1012382).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "slessp4-kernel-source-14354,slexsp3-kernel-source-14354",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_14354-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:14354-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:14354-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1012382",
        "url": "https://bugzilla.suse.com/1012382"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1091041",
        "url": "https://bugzilla.suse.com/1091041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1105327",
        "url": "https://bugzilla.suse.com/1105327"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1131107",
        "url": "https://bugzilla.suse.com/1131107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1136471",
        "url": "https://bugzilla.suse.com/1136471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1136922",
        "url": "https://bugzilla.suse.com/1136922"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146519",
        "url": "https://bugzilla.suse.com/1146519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146544",
        "url": "https://bugzilla.suse.com/1146544"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146612",
        "url": "https://bugzilla.suse.com/1146612"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1148871",
        "url": "https://bugzilla.suse.com/1148871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1149448",
        "url": "https://bugzilla.suse.com/1149448"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152631",
        "url": "https://bugzilla.suse.com/1152631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156652",
        "url": "https://bugzilla.suse.com/1156652"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157038",
        "url": "https://bugzilla.suse.com/1157038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157070",
        "url": "https://bugzilla.suse.com/1157070"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157143",
        "url": "https://bugzilla.suse.com/1157143"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157155",
        "url": "https://bugzilla.suse.com/1157155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157157",
        "url": "https://bugzilla.suse.com/1157157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157303",
        "url": "https://bugzilla.suse.com/1157303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157344",
        "url": "https://bugzilla.suse.com/1157344"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157678",
        "url": "https://bugzilla.suse.com/1157678"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157804",
        "url": "https://bugzilla.suse.com/1157804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157923",
        "url": "https://bugzilla.suse.com/1157923"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158381",
        "url": "https://bugzilla.suse.com/1158381"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158410",
        "url": "https://bugzilla.suse.com/1158410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158413",
        "url": "https://bugzilla.suse.com/1158413"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158427",
        "url": "https://bugzilla.suse.com/1158427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158445",
        "url": "https://bugzilla.suse.com/1158445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158823",
        "url": "https://bugzilla.suse.com/1158823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158824",
        "url": "https://bugzilla.suse.com/1158824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158834",
        "url": "https://bugzilla.suse.com/1158834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158900",
        "url": "https://bugzilla.suse.com/1158900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158904",
        "url": "https://bugzilla.suse.com/1158904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159285",
        "url": "https://bugzilla.suse.com/1159285"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159841",
        "url": "https://bugzilla.suse.com/1159841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159908",
        "url": "https://bugzilla.suse.com/1159908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159911",
        "url": "https://bugzilla.suse.com/1159911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161358",
        "url": "https://bugzilla.suse.com/1161358"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162929",
        "url": "https://bugzilla.suse.com/1162929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162931",
        "url": "https://bugzilla.suse.com/1162931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164078",
        "url": "https://bugzilla.suse.com/1164078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165111",
        "url": "https://bugzilla.suse.com/1165111"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165985",
        "url": "https://bugzilla.suse.com/1165985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167629",
        "url": "https://bugzilla.suse.com/1167629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168075",
        "url": "https://bugzilla.suse.com/1168075"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168829",
        "url": "https://bugzilla.suse.com/1168829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168854",
        "url": "https://bugzilla.suse.com/1168854"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-12456 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-12456/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14897 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15213 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15213/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15916 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15916/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18660 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18660/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18675 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18675/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19066 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19073 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19073/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19074 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19227 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19227/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19523 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19523/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19524 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19524/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19527 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19527/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19530 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19530/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19531 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19531/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19532 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19532/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19537 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19537/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19768 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19965 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19966 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20096 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10942 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10942/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11608 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11608/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8647 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8649 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8649/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-9383 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-9383/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-04-30T16:00:22Z",
      "generator": {
        "date": "2020-04-30T16:00:22Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:14354-1",
      "initial_release_date": "2020-04-30T16:00:22Z",
      "revision_history": [
        {
          "date": "2020-04-30T16:00:22Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-default-3.0.101-108.111.1.i586",
                  "product_id": "kernel-default-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-default-base-3.0.101-108.111.1.i586",
                  "product_id": "kernel-default-base-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-default-devel-3.0.101-108.111.1.i586",
                  "product_id": "kernel-default-devel-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-ec2-3.0.101-108.111.1.i586",
                  "product_id": "kernel-ec2-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-base-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-ec2-base-3.0.101-108.111.1.i586",
                  "product_id": "kernel-ec2-base-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-devel-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-ec2-devel-3.0.101-108.111.1.i586",
                  "product_id": "kernel-ec2-devel-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-pae-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-pae-3.0.101-108.111.1.i586",
                  "product_id": "kernel-pae-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-pae-base-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-pae-base-3.0.101-108.111.1.i586",
                  "product_id": "kernel-pae-base-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-pae-devel-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-pae-devel-3.0.101-108.111.1.i586",
                  "product_id": "kernel-pae-devel-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-source-3.0.101-108.111.1.i586",
                  "product_id": "kernel-source-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-syms-3.0.101-108.111.1.i586",
                  "product_id": "kernel-syms-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-trace-3.0.101-108.111.1.i586",
                  "product_id": "kernel-trace-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-base-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-trace-base-3.0.101-108.111.1.i586",
                  "product_id": "kernel-trace-base-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-devel-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-trace-devel-3.0.101-108.111.1.i586",
                  "product_id": "kernel-trace-devel-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-xen-3.0.101-108.111.1.i586",
                  "product_id": "kernel-xen-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-base-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-xen-base-3.0.101-108.111.1.i586",
                  "product_id": "kernel-xen-base-3.0.101-108.111.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-3.0.101-108.111.1.i586",
                "product": {
                  "name": "kernel-xen-devel-3.0.101-108.111.1.i586",
                  "product_id": "kernel-xen-devel-3.0.101-108.111.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-bigmem-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-bigmem-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-bigmem-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bigmem-base-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-bigmem-base-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-bigmem-base-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-bigmem-devel-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-default-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-default-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-default-base-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-default-base-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-default-devel-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-default-devel-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ppc64-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-ppc64-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-ppc64-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ppc64-base-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-ppc64-base-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-ppc64-base-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-ppc64-devel-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-source-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-source-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-syms-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-syms-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-trace-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-trace-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-base-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-trace-base-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-trace-base-3.0.101-108.111.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-devel-3.0.101-108.111.1.ppc64",
                "product": {
                  "name": "kernel-trace-devel-3.0.101-108.111.1.ppc64",
                  "product_id": "kernel-trace-devel-3.0.101-108.111.1.ppc64"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-3.0.101-108.111.1.s390x",
                "product": {
                  "name": "kernel-default-3.0.101-108.111.1.s390x",
                  "product_id": "kernel-default-3.0.101-108.111.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.0.101-108.111.1.s390x",
                "product": {
                  "name": "kernel-default-base-3.0.101-108.111.1.s390x",
                  "product_id": "kernel-default-base-3.0.101-108.111.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.0.101-108.111.1.s390x",
                "product": {
                  "name": "kernel-default-devel-3.0.101-108.111.1.s390x",
                  "product_id": "kernel-default-devel-3.0.101-108.111.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-3.0.101-108.111.1.s390x",
                "product": {
                  "name": "kernel-default-man-3.0.101-108.111.1.s390x",
                  "product_id": "kernel-default-man-3.0.101-108.111.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-3.0.101-108.111.1.s390x",
                "product": {
                  "name": "kernel-source-3.0.101-108.111.1.s390x",
                  "product_id": "kernel-source-3.0.101-108.111.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.0.101-108.111.1.s390x",
                "product": {
                  "name": "kernel-syms-3.0.101-108.111.1.s390x",
                  "product_id": "kernel-syms-3.0.101-108.111.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-3.0.101-108.111.1.s390x",
                "product": {
                  "name": "kernel-trace-3.0.101-108.111.1.s390x",
                  "product_id": "kernel-trace-3.0.101-108.111.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-base-3.0.101-108.111.1.s390x",
                "product": {
                  "name": "kernel-trace-base-3.0.101-108.111.1.s390x",
                  "product_id": "kernel-trace-base-3.0.101-108.111.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-devel-3.0.101-108.111.1.s390x",
                "product": {
                  "name": "kernel-trace-devel-3.0.101-108.111.1.s390x",
                  "product_id": "kernel-trace-devel-3.0.101-108.111.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-default-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-default-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-default-base-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-default-base-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-default-devel-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-ec2-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-ec2-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-base-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-ec2-base-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-ec2-base-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ec2-devel-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-ec2-devel-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-ec2-devel-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-source-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-source-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-syms-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-syms-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-trace-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-trace-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-base-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-trace-base-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-trace-base-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-trace-devel-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-trace-devel-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-trace-devel-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-xen-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-xen-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-base-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-xen-base-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-xen-base-3.0.101-108.111.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-3.0.101-108.111.1.x86_64",
                "product": {
                  "name": "kernel-xen-devel-3.0.101-108.111.1.x86_64",
                  "product_id": "kernel-xen-devel-3.0.101-108.111.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_sles:11:sp4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bigmem-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-bigmem-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bigmem-base-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-bigmem-base-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bigmem-devel-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-default-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-default-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x"
        },
        "product_reference": "kernel-default-3.0.101-108.111.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-default-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-default-base-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-default-base-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x"
        },
        "product_reference": "kernel-default-base-3.0.101-108.111.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-default-base-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-default-devel-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-default-devel-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x"
        },
        "product_reference": "kernel-default-devel-3.0.101-108.111.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-default-devel-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x"
        },
        "product_reference": "kernel-default-man-3.0.101-108.111.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-ec2-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-ec2-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-base-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-ec2-base-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-base-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-ec2-base-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-devel-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-ec2-devel-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ec2-devel-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-ec2-devel-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-pae-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-pae-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-pae-base-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-pae-base-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-pae-devel-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-pae-devel-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ppc64-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-ppc64-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ppc64-base-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-ppc64-base-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ppc64-devel-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-source-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-source-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x"
        },
        "product_reference": "kernel-source-3.0.101-108.111.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-source-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-syms-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-syms-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x"
        },
        "product_reference": "kernel-syms-3.0.101-108.111.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-syms-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-trace-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-trace-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x"
        },
        "product_reference": "kernel-trace-3.0.101-108.111.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-trace-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-base-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-trace-base-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-base-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-trace-base-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-base-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x"
        },
        "product_reference": "kernel-trace-base-3.0.101-108.111.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-base-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-trace-base-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-devel-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-trace-devel-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-devel-3.0.101-108.111.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64"
        },
        "product_reference": "kernel-trace-devel-3.0.101-108.111.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-devel-3.0.101-108.111.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x"
        },
        "product_reference": "kernel-trace-devel-3.0.101-108.111.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-trace-devel-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-trace-devel-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-xen-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-xen-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-base-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-xen-base-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-base-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-xen-base-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-3.0.101-108.111.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586"
        },
        "product_reference": "kernel-xen-devel-3.0.101-108.111.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-3.0.101-108.111.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        },
        "product_reference": "kernel-xen-devel-3.0.101-108.111.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-12456",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-12456"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** DISPUTED ** An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-12456",
          "url": "https://www.suse.com/security/cve/CVE-2019-12456"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136922 for CVE-2019-12456",
          "url": "https://bugzilla.suse.com/1136922"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136993 for CVE-2019-12456",
          "url": "https://bugzilla.suse.com/1136993"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-12456"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-14897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14897",
          "url": "https://www.suse.com/security/cve/CVE-2019-14897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157155 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1157155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160467 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14897"
    },
    {
      "cve": "CVE-2019-15213",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15213"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15213",
          "url": "https://www.suse.com/security/cve/CVE-2019-15213"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1146519"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146544 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1146544"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15213"
    },
    {
      "cve": "CVE-2019-15916",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15916"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15916",
          "url": "https://www.suse.com/security/cve/CVE-2019-15916"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149448 for CVE-2019-15916",
          "url": "https://bugzilla.suse.com/1149448"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-15916"
    },
    {
      "cve": "CVE-2019-18660",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18660"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18660",
          "url": "https://www.suse.com/security/cve/CVE-2019-18660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157038 for CVE-2019-18660",
          "url": "https://bugzilla.suse.com/1157038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157923 for CVE-2019-18660",
          "url": "https://bugzilla.suse.com/1157923"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18660"
    },
    {
      "cve": "CVE-2019-18675",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18675"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18675",
          "url": "https://www.suse.com/security/cve/CVE-2019-18675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157804 for CVE-2019-18675",
          "url": "https://bugzilla.suse.com/1157804"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18675"
    },
    {
      "cve": "CVE-2019-19066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19066",
          "url": "https://www.suse.com/security/cve/CVE-2019-19066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157303 for CVE-2019-19066",
          "url": "https://bugzilla.suse.com/1157303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19066"
    },
    {
      "cve": "CVE-2019-19073",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19073"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19073",
          "url": "https://www.suse.com/security/cve/CVE-2019-19073"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157070 for CVE-2019-19073",
          "url": "https://bugzilla.suse.com/1157070"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19073"
    },
    {
      "cve": "CVE-2019-19074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19074",
          "url": "https://www.suse.com/security/cve/CVE-2019-19074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157143 for CVE-2019-19074",
          "url": "https://bugzilla.suse.com/1157143"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19074"
    },
    {
      "cve": "CVE-2019-19227",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19227"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19227",
          "url": "https://www.suse.com/security/cve/CVE-2019-19227"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157678 for CVE-2019-19227",
          "url": "https://bugzilla.suse.com/1157678"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19227"
    },
    {
      "cve": "CVE-2019-19523",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19523"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19523",
          "url": "https://www.suse.com/security/cve/CVE-2019-19523"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158823 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19523"
    },
    {
      "cve": "CVE-2019-19524",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19524"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19524",
          "url": "https://www.suse.com/security/cve/CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19524",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158413 for CVE-2019-19524",
          "url": "https://bugzilla.suse.com/1158413"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19524",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19524"
    },
    {
      "cve": "CVE-2019-19527",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19527"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19527",
          "url": "https://www.suse.com/security/cve/CVE-2019-19527"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158900 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19527"
    },
    {
      "cve": "CVE-2019-19530",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19530"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19530",
          "url": "https://www.suse.com/security/cve/CVE-2019-19530"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19530",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158410 for CVE-2019-19530",
          "url": "https://bugzilla.suse.com/1158410"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19530",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19530"
    },
    {
      "cve": "CVE-2019-19531",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19531"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19531",
          "url": "https://www.suse.com/security/cve/CVE-2019-19531"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19531",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158427 for CVE-2019-19531",
          "url": "https://bugzilla.suse.com/1158427"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158445 for CVE-2019-19531",
          "url": "https://bugzilla.suse.com/1158445"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19531",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19531"
    },
    {
      "cve": "CVE-2019-19532",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19532"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19532",
          "url": "https://www.suse.com/security/cve/CVE-2019-19532"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158823 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158824 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19532"
    },
    {
      "cve": "CVE-2019-19537",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19537"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19537",
          "url": "https://www.suse.com/security/cve/CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158904 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158904"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19537"
    },
    {
      "cve": "CVE-2019-19768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19768",
          "url": "https://www.suse.com/security/cve/CVE-2019-19768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159285 for CVE-2019-19768",
          "url": "https://bugzilla.suse.com/1159285"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19768"
    },
    {
      "cve": "CVE-2019-19965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19965",
          "url": "https://www.suse.com/security/cve/CVE-2019-19965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159911 for CVE-2019-19965",
          "url": "https://bugzilla.suse.com/1159911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19965"
    },
    {
      "cve": "CVE-2019-19966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19966",
          "url": "https://www.suse.com/security/cve/CVE-2019-19966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159841 for CVE-2019-19966",
          "url": "https://bugzilla.suse.com/1159841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19966"
    },
    {
      "cve": "CVE-2019-20096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20096",
          "url": "https://www.suse.com/security/cve/CVE-2019-20096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159908 for CVE-2019-20096",
          "url": "https://bugzilla.suse.com/1159908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20096"
    },
    {
      "cve": "CVE-2020-10942",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10942"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10942",
          "url": "https://www.suse.com/security/cve/CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1167629 for CVE-2020-10942",
          "url": "https://bugzilla.suse.com/1167629"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10942"
    },
    {
      "cve": "CVE-2020-11608",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11608"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11608",
          "url": "https://www.suse.com/security/cve/CVE-2020-11608"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168829 for CVE-2020-11608",
          "url": "https://bugzilla.suse.com/1168829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-11608"
    },
    {
      "cve": "CVE-2020-8647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8647",
          "url": "https://www.suse.com/security/cve/CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162929 for CVE-2020-8647",
          "url": "https://bugzilla.suse.com/1162929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164078 for CVE-2020-8647",
          "url": "https://bugzilla.suse.com/1164078"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8647"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8649",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8649"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8649",
          "url": "https://www.suse.com/security/cve/CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162929 for CVE-2020-8649",
          "url": "https://bugzilla.suse.com/1162929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162931 for CVE-2020-8649",
          "url": "https://bugzilla.suse.com/1162931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8649"
    },
    {
      "cve": "CVE-2020-9383",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-9383"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
          "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-9383",
          "url": "https://www.suse.com/security/cve/CVE-2020-9383"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165111 for CVE-2020-9383",
          "url": "https://bugzilla.suse.com/1165111"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.111.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.i586",
            "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.111.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-04-30T16:00:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-9383"
    }
  ]
}
  suse-su-2020:1275-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).\n- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).\n- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).\n- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).\n- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).\n- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).\n- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).\n- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).\n- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).\n- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).\n- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).\n- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).\n- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).\n- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).\n- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).\n- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).\n- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).\n- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).\n- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).\n- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).\n- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).\n- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).\n- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).\n- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the \u0027MDS\u0027 Microarchitectural Data Sampling attacks were not complete.\n  An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)\n\n\nThe following non-security bugs were fixed:\n\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- btrfs: fix btrfs_wait_ordered_range() so that it waits for all ordered extents (bsc#1163508).\n- btrfs: fix panic during relocation after ENOSPC before writeback happens (bsc#1163508).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1158642)\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1164009).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- input: add safety guards to input_set_keycode() (bsc#1168075).\n- ipv4: correct gso_size for UFO (bsc#1154844).\n- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).\n- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).\n- md: add mddev-\u003epers to avoid potential NULL pointer dereference (bsc#1056134).\n- md/bitmap: do not read page from device with Bitmap_sync (bsc#1056134).\n- md: change the initialization value for a spare device spot to MD_DISK_ROLE_SPARE (bsc#1056134).\n- md: Delete gendisk before cleaning up the request queue (bsc#1056134).\n- md: do not call bitmap_create() while array is quiesced (bsc#1056134).\n- md: do not set In_sync if array is frozen (bsc#1056134).\n- md: fix a potential deadlock of raid5/raid10 reshape (bsc#1056134).\n- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1056134).\n- md: notify about new spare disk in the container (bsc#1056134).\n- md/raid0: Fix buffer overflow at debug print (bsc#1164051).\n- md/raid10: end bio when the device faulty (bsc#1056134).\n- md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1056134).\n- md/raid1,raid10: silence warning about wait-within-wait (bsc#1056134).\n- md: return -ENODEV if rdev has no mddev assigned (bsc#1056134).\n- media: ov519: add missing endpoint sanity checks (bsc#1168829).\n- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).\n- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).\n- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- rpm/kernel-binary.spec.in: Replace Novell with SUSE\n- sched/fair: Scale bandwidth quota and period without losing quota/period ratio precision (bsc#1161586).\n- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).\n- scsi: core: kABI fix already_offline (bsc#1145929).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1154118).\n- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846 bsc#1170847).\n- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).\n- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "HPE-Helion-OpenStack-8-2020-1275,SUSE-2020-1275,SUSE-OpenStack-Cloud-8-2020-1275,SUSE-OpenStack-Cloud-Crowbar-8-2020-1275,SUSE-SLE-HA-12-SP3-2020-1275,SUSE-SLE-SAP-12-SP3-2020-1275,SUSE-SLE-SERVER-12-SP3-2020-1275,SUSE-SLE-SERVER-12-SP3-BCL-2020-1275,SUSE-Storage-5-2020-1275",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1275-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:1275-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201275-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:1275-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1056134",
        "url": "https://bugzilla.suse.com/1056134"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087813",
        "url": "https://bugzilla.suse.com/1087813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1120386",
        "url": "https://bugzilla.suse.com/1120386"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133147",
        "url": "https://bugzilla.suse.com/1133147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1137325",
        "url": "https://bugzilla.suse.com/1137325"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1145929",
        "url": "https://bugzilla.suse.com/1145929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1149591",
        "url": "https://bugzilla.suse.com/1149591"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154118",
        "url": "https://bugzilla.suse.com/1154118"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154844",
        "url": "https://bugzilla.suse.com/1154844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155689",
        "url": "https://bugzilla.suse.com/1155689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157155",
        "url": "https://bugzilla.suse.com/1157155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157157",
        "url": "https://bugzilla.suse.com/1157157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157303",
        "url": "https://bugzilla.suse.com/1157303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157804",
        "url": "https://bugzilla.suse.com/1157804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158021",
        "url": "https://bugzilla.suse.com/1158021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158642",
        "url": "https://bugzilla.suse.com/1158642"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158819",
        "url": "https://bugzilla.suse.com/1158819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159199",
        "url": "https://bugzilla.suse.com/1159199"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159285",
        "url": "https://bugzilla.suse.com/1159285"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159297",
        "url": "https://bugzilla.suse.com/1159297"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159841",
        "url": "https://bugzilla.suse.com/1159841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159908",
        "url": "https://bugzilla.suse.com/1159908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159910",
        "url": "https://bugzilla.suse.com/1159910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159911",
        "url": "https://bugzilla.suse.com/1159911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159912",
        "url": "https://bugzilla.suse.com/1159912"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160195",
        "url": "https://bugzilla.suse.com/1160195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161586",
        "url": "https://bugzilla.suse.com/1161586"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162227",
        "url": "https://bugzilla.suse.com/1162227"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162929",
        "url": "https://bugzilla.suse.com/1162929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162931",
        "url": "https://bugzilla.suse.com/1162931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163508",
        "url": "https://bugzilla.suse.com/1163508"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163971",
        "url": "https://bugzilla.suse.com/1163971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164009",
        "url": "https://bugzilla.suse.com/1164009"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164051",
        "url": "https://bugzilla.suse.com/1164051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164069",
        "url": "https://bugzilla.suse.com/1164069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164078",
        "url": "https://bugzilla.suse.com/1164078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164846",
        "url": "https://bugzilla.suse.com/1164846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165111",
        "url": "https://bugzilla.suse.com/1165111"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165311",
        "url": "https://bugzilla.suse.com/1165311"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165873",
        "url": "https://bugzilla.suse.com/1165873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165881",
        "url": "https://bugzilla.suse.com/1165881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165984",
        "url": "https://bugzilla.suse.com/1165984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165985",
        "url": "https://bugzilla.suse.com/1165985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167421",
        "url": "https://bugzilla.suse.com/1167421"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167423",
        "url": "https://bugzilla.suse.com/1167423"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167629",
        "url": "https://bugzilla.suse.com/1167629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168075",
        "url": "https://bugzilla.suse.com/1168075"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168295",
        "url": "https://bugzilla.suse.com/1168295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168424",
        "url": "https://bugzilla.suse.com/1168424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168829",
        "url": "https://bugzilla.suse.com/1168829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168854",
        "url": "https://bugzilla.suse.com/1168854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170056",
        "url": "https://bugzilla.suse.com/1170056"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170345",
        "url": "https://bugzilla.suse.com/1170345"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170778",
        "url": "https://bugzilla.suse.com/1170778"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170847",
        "url": "https://bugzilla.suse.com/1170847"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-18255 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-18255/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12126 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12126/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12127 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12130 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12130/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-21008 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-21008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-11091 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-11091/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14615 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14897 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18675 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18675/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19066 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19319 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19319/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19447 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19447/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19767 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19768 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19965 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19966 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20096 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3701 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3701/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5108 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5108/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-9455 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-9455/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-9458 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-9458/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10690 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10690/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10720 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10720/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10942 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10942/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11494 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11494/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11608 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11608/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11609 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11609/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8647 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8649 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8649/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-9383 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-9383/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-05-14T09:34:21Z",
      "generator": {
        "date": "2020-05-14T09:34:21Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:1275-1",
      "initial_release_date": "2020-05-14T09:34:21Z",
      "revision_history": [
        {
          "date": "2020-05-14T09:34:21Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.180-94.116.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.4.180-94.116.1.aarch64",
                  "product_id": "dlm-kmp-default-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.4.180-94.116.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "kernel-default-4.4.180-94.116.1.aarch64",
                  "product_id": "kernel-default-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.4.180-94.116.1.aarch64",
                  "product_id": "kernel-default-base-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.4.180-94.116.1.aarch64",
                  "product_id": "kernel-default-devel-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.4.180-94.116.1.aarch64",
                  "product_id": "kernel-default-extra-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-4.4.180-94.116.1.aarch64",
                  "product_id": "kernel-default-kgraft-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.4.180-94.116.1.aarch64",
                  "product_id": "kernel-obs-build-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.4.180-94.116.1.aarch64",
                  "product_id": "kernel-obs-qa-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.4.180-94.116.1.aarch64",
                  "product_id": "kernel-syms-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.4.180-94.116.1.aarch64",
                  "product_id": "kernel-vanilla-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.4.180-94.116.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.4.180-94.116.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.4.180-94.116.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.4.180-94.116.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.180-94.116.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.180-94.116.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.4.180-94.116.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.4.180-94.116.1.noarch",
                "product": {
                  "name": "kernel-devel-4.4.180-94.116.1.noarch",
                  "product_id": "kernel-devel-4.4.180-94.116.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.4.180-94.116.1.noarch",
                "product": {
                  "name": "kernel-macros-4.4.180-94.116.1.noarch",
                  "product_id": "kernel-macros-4.4.180-94.116.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.4.180-94.116.1.noarch",
                "product": {
                  "name": "kernel-source-4.4.180-94.116.1.noarch",
                  "product_id": "kernel-source-4.4.180-94.116.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.4.180-94.116.1.noarch",
                "product": {
                  "name": "kernel-docs-4.4.180-94.116.1.noarch",
                  "product_id": "kernel-docs-4.4.180-94.116.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.4.180-94.116.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.4.180-94.116.1.noarch",
                  "product_id": "kernel-docs-html-4.4.180-94.116.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-pdf-4.4.180-94.116.1.noarch",
                "product": {
                  "name": "kernel-docs-pdf-4.4.180-94.116.1.noarch",
                  "product_id": "kernel-docs-pdf-4.4.180-94.116.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.4.180-94.116.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.4.180-94.116.1.noarch",
                  "product_id": "kernel-source-vanilla-4.4.180-94.116.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-debug-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-debug-4.4.180-94.116.1.ppc64le",
                  "product_id": "cluster-md-kmp-debug-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-debug-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-debug-4.4.180-94.116.1.ppc64le",
                  "product_id": "dlm-kmp-debug-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.4.180-94.116.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-debug-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-debug-4.4.180-94.116.1.ppc64le",
                  "product_id": "gfs2-kmp-debug-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-debug-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-debug-base-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-extra-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-debug-extra-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-debug-extra-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-debug-kgraft-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-debug-kgraft-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-default-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-default-base-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-default-devel-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-default-extra-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-obs-build-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-syms-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-vanilla-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.4.180-94.116.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
                  "product_id": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-debug-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-debug-4.4.180-94.116.1.ppc64le",
                  "product_id": "kselftests-kmp-debug-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.4.180-94.116.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-debug-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-debug-4.4.180-94.116.1.ppc64le",
                  "product_id": "ocfs2-kmp-debug-4.4.180-94.116.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.4.180-94.116.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.180-94.116.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.4.180-94.116.1.s390x",
                  "product_id": "dlm-kmp-default-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.4.180-94.116.1.s390x",
                  "product_id": "gfs2-kmp-default-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-default-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-default-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-default-base-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-default-devel-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-default-extra-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-default-kgraft-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-default-man-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-obs-build-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-obs-qa-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-syms-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-syms-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-vanilla-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-vanilla-base-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.4.180-94.116.1.s390x",
                  "product_id": "kernel-zfcpdump-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.4.180-94.116.1.s390x",
                  "product_id": "kselftests-kmp-default-4.4.180-94.116.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.180-94.116.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.180-94.116.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.4.180-94.116.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-default-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-default-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-default-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-default-base-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-default-devel-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-default-kgraft-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-syms-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
                  "product_id": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-debug-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-debug-4.4.180-94.116.1.x86_64",
                  "product_id": "cluster-md-kmp-debug-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-debug-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "dlm-kmp-debug-4.4.180-94.116.1.x86_64",
                  "product_id": "dlm-kmp-debug-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.4.180-94.116.1.x86_64",
                  "product_id": "dlm-kmp-default-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-debug-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-debug-4.4.180-94.116.1.x86_64",
                  "product_id": "gfs2-kmp-debug-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.4.180-94.116.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-debug-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-debug-base-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-debug-devel-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-extra-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-debug-extra-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-debug-extra-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-debug-kgraft-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-debug-kgraft-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-default-extra-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-obs-build-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-obs-qa-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-vanilla-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.4.180-94.116.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-debug-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-debug-4.4.180-94.116.1.x86_64",
                  "product_id": "kselftests-kmp-debug-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.4.180-94.116.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-debug-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-debug-4.4.180-94.116.1.x86_64",
                  "product_id": "ocfs2-kmp-debug-4.4.180-94.116.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.4.180-94.116.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "HPE Helion OpenStack 8",
                "product": {
                  "name": "HPE Helion OpenStack 8",
                  "product_id": "HPE Helion OpenStack 8",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:hpe-helion-openstack:8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud 8",
                "product": {
                  "name": "SUSE OpenStack Cloud 8",
                  "product_id": "SUSE OpenStack Cloud 8",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud:8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud Crowbar 8",
                "product": {
                  "name": "SUSE OpenStack Cloud Crowbar 8",
                  "product_id": "SUSE OpenStack Cloud Crowbar 8",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP3-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP3-BCL",
                  "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-bcl:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Enterprise Storage 5",
                "product": {
                  "name": "SUSE Enterprise Storage 5",
                  "product_id": "SUSE Enterprise Storage 5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:ses:5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.180-94.116.1.noarch as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.180-94.116.1.noarch as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.180-94.116.1.noarch as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-source-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8",
          "product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
        "relates_to_product_reference": "HPE Helion OpenStack 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.180-94.116.1.noarch as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.180-94.116.1.noarch as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.180-94.116.1.noarch as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-source-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8",
          "product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.180-94.116.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.180-94.116.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.180-94.116.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-source-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
          "product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.4.180-94.116.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.4.180-94.116.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.4.180-94.116.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.4.180-94.116.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "kernel-default-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-source-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.180-94.116.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64"
        },
        "product_reference": "kernel-default-4.4.180-94.116.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "kernel-default-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x"
        },
        "product_reference": "kernel-default-4.4.180-94.116.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.180-94.116.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.4.180-94.116.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x"
        },
        "product_reference": "kernel-default-base-4.4.180-94.116.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.180-94.116.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.4.180-94.116.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.4.180-94.116.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x"
        },
        "product_reference": "kernel-default-man-4.4.180-94.116.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-source-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.180-94.116.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64"
        },
        "product_reference": "kernel-syms-4.4.180-94.116.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.180-94.116.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.4.180-94.116.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.180-94.116.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x"
        },
        "product_reference": "kernel-syms-4.4.180-94.116.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.180-94.116.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-source-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.180-94.116.1.aarch64 as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64"
        },
        "product_reference": "kernel-default-4.4.180-94.116.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.180-94.116.1.x86_64 as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.180-94.116.1.aarch64 as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.4.180-94.116.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.180-94.116.1.x86_64 as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.180-94.116.1.aarch64 as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.4.180-94.116.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.180-94.116.1.x86_64 as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.4.180-94.116.1.x86_64 as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.180-94.116.1.noarch as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.180-94.116.1.noarch as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.180-94.116.1.noarch as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch"
        },
        "product_reference": "kernel-source-4.4.180-94.116.1.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.180-94.116.1.aarch64 as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64"
        },
        "product_reference": "kernel-syms-4.4.180-94.116.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.180-94.116.1.x86_64 as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.180-94.116.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64 as component of SUSE Enterprise Storage 5",
          "product_id": "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-18255",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-18255"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The perf_cpu_time_max_percent_handler function in kernel/events/core.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-18255",
          "url": "https://www.suse.com/security/cve/CVE-2017-18255"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-18255",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087813 for CVE-2017-18255",
          "url": "https://bugzilla.suse.com/1087813"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-18255"
    },
    {
      "cve": "CVE-2018-12126",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12126"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12126",
          "url": "https://www.suse.com/security/cve/CVE-2018-12126"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1103186 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1103186"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1111331 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1111331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1135409 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1135409"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1135524 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1135524"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1137916 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1137916"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1138534 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1138534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1141977 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1141977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149725 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1149725"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149726 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1149726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149729 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1149729"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-12126"
    },
    {
      "cve": "CVE-2018-12127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12127",
          "url": "https://www.suse.com/security/cve/CVE-2018-12127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1103186 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1103186"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1111331 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1111331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1135409 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1135409"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1138534 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1138534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1141977 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1141977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-12127"
    },
    {
      "cve": "CVE-2018-12130",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12130"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12130",
          "url": "https://www.suse.com/security/cve/CVE-2018-12130"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1103186 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1103186"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1111331 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1111331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1135409 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1135409"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1137916 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1137916"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1138534 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1138534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1141977 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1141977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-12130"
    },
    {
      "cve": "CVE-2018-21008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-21008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 4.16.7. A use-after-free can be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-21008",
          "url": "https://www.suse.com/security/cve/CVE-2018-21008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149591 for CVE-2018-21008",
          "url": "https://bugzilla.suse.com/1149591"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-21008"
    },
    {
      "cve": "CVE-2019-11091",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-11091"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-11091",
          "url": "https://www.suse.com/security/cve/CVE-2019-11091"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1103186 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1103186"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1111331 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1111331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133319 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1133319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1135394 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1135394"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1138043 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1138043"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1138534 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1138534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1141977 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1141977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-11091"
    },
    {
      "cve": "CVE-2019-14615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14615",
          "url": "https://www.suse.com/security/cve/CVE-2019-14615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160195 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1160195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165881 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1165881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14615"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-14897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14897",
          "url": "https://www.suse.com/security/cve/CVE-2019-14897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157155 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1157155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160467 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14897"
    },
    {
      "cve": "CVE-2019-18675",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18675"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18675",
          "url": "https://www.suse.com/security/cve/CVE-2019-18675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157804 for CVE-2019-18675",
          "url": "https://bugzilla.suse.com/1157804"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18675"
    },
    {
      "cve": "CVE-2019-19066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19066",
          "url": "https://www.suse.com/security/cve/CVE-2019-19066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157303 for CVE-2019-19066",
          "url": "https://bugzilla.suse.com/1157303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19066"
    },
    {
      "cve": "CVE-2019-19319",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19319"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19319",
          "url": "https://www.suse.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158021 for CVE-2019-19319",
          "url": "https://bugzilla.suse.com/1158021"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19319"
    },
    {
      "cve": "CVE-2019-19447",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19447"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19447",
          "url": "https://www.suse.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158819 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1158819"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173869 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1173869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-19447"
    },
    {
      "cve": "CVE-2019-19767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19767",
          "url": "https://www.suse.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159297 for CVE-2019-19767",
          "url": "https://bugzilla.suse.com/1159297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19767"
    },
    {
      "cve": "CVE-2019-19768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19768",
          "url": "https://www.suse.com/security/cve/CVE-2019-19768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159285 for CVE-2019-19768",
          "url": "https://bugzilla.suse.com/1159285"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19768"
    },
    {
      "cve": "CVE-2019-19965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19965",
          "url": "https://www.suse.com/security/cve/CVE-2019-19965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159911 for CVE-2019-19965",
          "url": "https://bugzilla.suse.com/1159911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19965"
    },
    {
      "cve": "CVE-2019-19966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19966",
          "url": "https://www.suse.com/security/cve/CVE-2019-19966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159841 for CVE-2019-19966",
          "url": "https://bugzilla.suse.com/1159841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19966"
    },
    {
      "cve": "CVE-2019-20054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20054",
          "url": "https://www.suse.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159910 for CVE-2019-20054",
          "url": "https://bugzilla.suse.com/1159910"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20054"
    },
    {
      "cve": "CVE-2019-20096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20096",
          "url": "https://www.suse.com/security/cve/CVE-2019-20096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159908 for CVE-2019-20096",
          "url": "https://bugzilla.suse.com/1159908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20096"
    },
    {
      "cve": "CVE-2019-3701",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3701"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user \"root\" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller\u0027s I/O memory when processing can-gw manipulated outgoing frames.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3701",
          "url": "https://www.suse.com/security/cve/CVE-2019-3701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1120386 for CVE-2019-3701",
          "url": "https://bugzilla.suse.com/1120386"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3701"
    },
    {
      "cve": "CVE-2019-5108",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5108"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5108",
          "url": "https://www.suse.com/security/cve/CVE-2019-5108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159912 for CVE-2019-5108",
          "url": "https://bugzilla.suse.com/1159912"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159913 for CVE-2019-5108",
          "url": "https://bugzilla.suse.com/1159913"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5108"
    },
    {
      "cve": "CVE-2019-9455",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-9455"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-9455",
          "url": "https://www.suse.com/security/cve/CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170345 for CVE-2019-9455",
          "url": "https://bugzilla.suse.com/1170345"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-9455"
    },
    {
      "cve": "CVE-2019-9458",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-9458"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-9458",
          "url": "https://www.suse.com/security/cve/CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168295 for CVE-2019-9458",
          "url": "https://bugzilla.suse.com/1168295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173963 for CVE-2019-9458",
          "url": "https://bugzilla.suse.com/1173963"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-9458"
    },
    {
      "cve": "CVE-2020-10690",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10690"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10690",
          "url": "https://www.suse.com/security/cve/CVE-2020-10690"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170056 for CVE-2020-10690",
          "url": "https://bugzilla.suse.com/1170056"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10690"
    },
    {
      "cve": "CVE-2020-10720",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10720"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10720",
          "url": "https://www.suse.com/security/cve/CVE-2020-10720"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170778 for CVE-2020-10720",
          "url": "https://bugzilla.suse.com/1170778"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10720"
    },
    {
      "cve": "CVE-2020-10942",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10942"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10942",
          "url": "https://www.suse.com/security/cve/CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1167629 for CVE-2020-10942",
          "url": "https://bugzilla.suse.com/1167629"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10942"
    },
    {
      "cve": "CVE-2020-11494",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11494"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11494",
          "url": "https://www.suse.com/security/cve/CVE-2020-11494"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168424 for CVE-2020-11494",
          "url": "https://bugzilla.suse.com/1168424"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-11494"
    },
    {
      "cve": "CVE-2020-11608",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11608"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11608",
          "url": "https://www.suse.com/security/cve/CVE-2020-11608"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168829 for CVE-2020-11608",
          "url": "https://bugzilla.suse.com/1168829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-11608"
    },
    {
      "cve": "CVE-2020-11609",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11609"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11609",
          "url": "https://www.suse.com/security/cve/CVE-2020-11609"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168854 for CVE-2020-11609",
          "url": "https://bugzilla.suse.com/1168854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-11609"
    },
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-8647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8647",
          "url": "https://www.suse.com/security/cve/CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162929 for CVE-2020-8647",
          "url": "https://bugzilla.suse.com/1162929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164078 for CVE-2020-8647",
          "url": "https://bugzilla.suse.com/1164078"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8647"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8649",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8649"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8649",
          "url": "https://www.suse.com/security/cve/CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162929 for CVE-2020-8649",
          "url": "https://bugzilla.suse.com/1162929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162931 for CVE-2020-8649",
          "url": "https://bugzilla.suse.com/1162931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8649"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    },
    {
      "cve": "CVE-2020-9383",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-9383"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
          "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
          "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
          "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-9383",
          "url": "https://www.suse.com/security/cve/CVE-2020-9383"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165111 for CVE-2020-9383",
          "url": "https://bugzilla.suse.com/1165111"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "HPE Helion OpenStack 8:kernel-default-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-source-4.4.180-94.116.1.noarch",
            "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.116.1.noarch",
            "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.116.1.x86_64",
            "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_116-default-1-4.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-14T09:34:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-9383"
    }
  ]
}
  suse-su-2020:1255-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-11494: An issue was discovered in slc_bump in drivers/net/can/slcan.c, which allowed attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL (bnc#1168424).\n- CVE-2020-10942: In get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls (bnc#1167629).\n- CVE-2020-8647: Fixed a use-after-free vulnerability in the vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929).\n- CVE-2020-8649: Fixed a use-after-free vulnerability in the vgacon_invert_region function in drivers/video/console/vgacon.c (bnc#1162931).\n- CVE-2020-9383: Fixed an issue in set_fdc in drivers/block/floppy.c, which leads to a wait_til_ready out-of-bounds read (bnc#1165111).\n- CVE-2019-9458: In the video driver there was a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed (bnc#1168295).\n- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bnc#1120386).\n- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).\n- CVE-2020-11609: Fixed a NULL pointer dereference in the stv06xx subsystem caused by mishandling invalid descriptors (bnc#1168854).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bnc#1170345).\n- CVE-2020-11608: Fixed an issue in drivers/media/usb/gspca/ov519.c caused by a NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints (bnc#1168829).\n- CVE-2017-18255: The perf_cpu_time_max_percent_handler function in kernel/events/core.c allowed local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation (bnc#1087813).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).\n- CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest (bnc#1163971).\n- CVE-2019-5108: Fixed a denial-of-service vulnerability caused by triggering AP to send IAPP location updates for stations before the required authentication process has completed (bnc#1159912).\n- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).\n- CVE-2018-21008: Fixed a use-after-free which could be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).\n- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).\n- CVE-2019-14897: A stack-based buffer overflow was found in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).\n- CVE-2019-18675: Fixed an integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allowed local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation (bnc#1157804).\n- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195, bsc#1165881).\n- CVE-2019-19965: Fixed a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition (bnc#1159911).\n- CVE-2019-20054: Fixed a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).\n- CVE-2019-19447: Fixed an issue with mounting a crafted ext4 filesystem image, performing some operations, and unmounting could lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19319: Fixed an issue with a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).\n- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).\n- CVE-2019-19066: Fixed memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c that allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures (bnc#1157303).\n- CVE-2019-19332: There was an OOB memory write via kvm_dev_ioctl_get_cpuid (bsc#1158827).\n- CVE-2019-19537: There was a race condition bug that could have been caused by a malicious USB device in the USB character device driver layer (bnc#1158904).\n- CVE-2019-19535: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bnc#1158903).\n- CVE-2019-19527: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bnc#1158900).\n- CVE-2019-19533: There was an info-leak bug that could have been caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bnc#1158834).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that could have been caused by a malicious USB device in the Linux kernel HID drivers (bnc#1158824).\n- CVE-2019-19523: There was a use-after-free bug that could have been caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (bnc#1158823).\n- CVE-2019-15213: An issue was discovered in the Linux kernel, there was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).\n- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).\n- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).\n- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).\n- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).\n- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).\n- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).\n- CVE-2019-14895: Fixed a heap-based buffer overflow in the Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-18660: Fixed a information disclosure on powerpc related to the Spectre-RSB mitigation. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038 1157923).\n- CVE-2019-18683: Fixed a privilege escalation where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem) (bnc#1155897).\n- CVE-2019-19062: Fixed a memory leak in the crypto_report() function in crypto/crypto_user_base.c, which allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).\n- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).\n- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).\n- CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures (bnc#1157070).\n- CVE-2019-11091,CVE-2018-12126,CVE-2018-12130,CVE-2018-12127: Earlier mitigations for the \u0027MDS\u0027 Microarchitectural Data Sampling attacks were not complete.\n  An additional fix was added to the x86_64 fast systemcall path to further mitigate these attacks. (bsc#1164846 bsc#1170847)\n\n\nThe following non-security bugs were fixed:\n\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks (bsc#1155311).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1155311).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1155311).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1155311).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1155311).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1155311).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1155311).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1155311).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1155311).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1155311).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1155311).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1155311).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1155311).\n- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1155311).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1155311).\n- cgroup: avoid copying strings longer than the buffers (bsc#1146544).\n- cgroup: use strlcpy() instead of strscpy() to avoid spurious warning (bsc#1146544).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).\n- fix PageHeadHuge() race with THP split (VM Functionality, bsc#1165311).\n- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099279 bsc#1156060).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- futex: Use smp_store_release() in mark_wake_futex() (bsc#1157464).\n- Input: add safety guards to input_set_keycode() (bsc#1168075).\n- ipv4: correct gso_size for UFO (bsc#1154844).\n- ipv6: fix memory accounting during ipv6 queue expire (bsc#1162227) (bsc#1162227).\n- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).\n- media: ov519: add missing endpoint sanity checks (bsc#1168829).\n- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).\n- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bsc#1131107).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/64: Make stf barrier PPC_BOOK3S_64 specific (bsc#1131107).\n- powerpc/64s: Add new security feature flags for count cache flush (bsc#1131107).\n- powerpc/64s: Add support for software count cache flush (bsc#1131107).\n- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).\n- powerpc/asm: Add a patch_site macro \u0026 helpers for patching instructions (bsc#1131107).\n- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).\n- powerpc/fsl: Fix spectre_v2 mitigations reporting (bsc#1131107).\n- powerpc/powernv: Query firmware for count cache flush settings (bsc#1131107).\n- powerpc/pseries: Query hypervisor for count cache flush settings (bsc#1131107).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix spectre_v2 reporting (bsc#1131107).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).\n- route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race (bsc#1037216).\n- sched/fair: WARN() and refuse to set buddy when !se-\u003eon_rq (bsc#1158132).\n- string: drop __must_check from strscpy() and restore strscpy() usages in cgroup (bsc#1146544).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/mitigations: Clear CPU buffers on the SYSCALL fast path (bsc#1164846).\n- xen/pv: Fix a boot up hang revealed by int3 self test (bsc#1153811).\n- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).\n- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-1255,SUSE-OpenStack-Cloud-7-2020-1255,SUSE-SLE-HA-12-SP2-2020-1255,SUSE-SLE-SAP-12-SP2-2020-1255,SUSE-SLE-SERVER-12-SP2-2020-1255,SUSE-SLE-SERVER-12-SP2-BCL-2020-1255",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1255-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:1255-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201255-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:1255-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1037216",
        "url": "https://bugzilla.suse.com/1037216"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075091",
        "url": "https://bugzilla.suse.com/1075091"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075994",
        "url": "https://bugzilla.suse.com/1075994"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087082",
        "url": "https://bugzilla.suse.com/1087082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087813",
        "url": "https://bugzilla.suse.com/1087813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1091041",
        "url": "https://bugzilla.suse.com/1091041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1099279",
        "url": "https://bugzilla.suse.com/1099279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1120386",
        "url": "https://bugzilla.suse.com/1120386"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1131107",
        "url": "https://bugzilla.suse.com/1131107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133147",
        "url": "https://bugzilla.suse.com/1133147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1136449",
        "url": "https://bugzilla.suse.com/1136449"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1137325",
        "url": "https://bugzilla.suse.com/1137325"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146519",
        "url": "https://bugzilla.suse.com/1146519"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146544",
        "url": "https://bugzilla.suse.com/1146544"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146612",
        "url": "https://bugzilla.suse.com/1146612"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1149591",
        "url": "https://bugzilla.suse.com/1149591"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153811",
        "url": "https://bugzilla.suse.com/1153811"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154844",
        "url": "https://bugzilla.suse.com/1154844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155311",
        "url": "https://bugzilla.suse.com/1155311"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155897",
        "url": "https://bugzilla.suse.com/1155897"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156060",
        "url": "https://bugzilla.suse.com/1156060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157038",
        "url": "https://bugzilla.suse.com/1157038"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157042",
        "url": "https://bugzilla.suse.com/1157042"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157070",
        "url": "https://bugzilla.suse.com/1157070"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157143",
        "url": "https://bugzilla.suse.com/1157143"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157155",
        "url": "https://bugzilla.suse.com/1157155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157157",
        "url": "https://bugzilla.suse.com/1157157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157158",
        "url": "https://bugzilla.suse.com/1157158"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157303",
        "url": "https://bugzilla.suse.com/1157303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157324",
        "url": "https://bugzilla.suse.com/1157324"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157333",
        "url": "https://bugzilla.suse.com/1157333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157464",
        "url": "https://bugzilla.suse.com/1157464"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157804",
        "url": "https://bugzilla.suse.com/1157804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157923",
        "url": "https://bugzilla.suse.com/1157923"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158021",
        "url": "https://bugzilla.suse.com/1158021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158132",
        "url": "https://bugzilla.suse.com/1158132"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158381",
        "url": "https://bugzilla.suse.com/1158381"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158394",
        "url": "https://bugzilla.suse.com/1158394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158398",
        "url": "https://bugzilla.suse.com/1158398"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158410",
        "url": "https://bugzilla.suse.com/1158410"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158413",
        "url": "https://bugzilla.suse.com/1158413"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158417",
        "url": "https://bugzilla.suse.com/1158417"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158427",
        "url": "https://bugzilla.suse.com/1158427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158445",
        "url": "https://bugzilla.suse.com/1158445"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158819",
        "url": "https://bugzilla.suse.com/1158819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158823",
        "url": "https://bugzilla.suse.com/1158823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158824",
        "url": "https://bugzilla.suse.com/1158824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158827",
        "url": "https://bugzilla.suse.com/1158827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158834",
        "url": "https://bugzilla.suse.com/1158834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158900",
        "url": "https://bugzilla.suse.com/1158900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158903",
        "url": "https://bugzilla.suse.com/1158903"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158904",
        "url": "https://bugzilla.suse.com/1158904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159199",
        "url": "https://bugzilla.suse.com/1159199"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159285",
        "url": "https://bugzilla.suse.com/1159285"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159297",
        "url": "https://bugzilla.suse.com/1159297"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159841",
        "url": "https://bugzilla.suse.com/1159841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159908",
        "url": "https://bugzilla.suse.com/1159908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159910",
        "url": "https://bugzilla.suse.com/1159910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159911",
        "url": "https://bugzilla.suse.com/1159911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159912",
        "url": "https://bugzilla.suse.com/1159912"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160195",
        "url": "https://bugzilla.suse.com/1160195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162227",
        "url": "https://bugzilla.suse.com/1162227"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162298",
        "url": "https://bugzilla.suse.com/1162298"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162929",
        "url": "https://bugzilla.suse.com/1162929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162931",
        "url": "https://bugzilla.suse.com/1162931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163971",
        "url": "https://bugzilla.suse.com/1163971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164069",
        "url": "https://bugzilla.suse.com/1164069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164078",
        "url": "https://bugzilla.suse.com/1164078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164846",
        "url": "https://bugzilla.suse.com/1164846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165111",
        "url": "https://bugzilla.suse.com/1165111"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165311",
        "url": "https://bugzilla.suse.com/1165311"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165873",
        "url": "https://bugzilla.suse.com/1165873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165881",
        "url": "https://bugzilla.suse.com/1165881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165984",
        "url": "https://bugzilla.suse.com/1165984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165985",
        "url": "https://bugzilla.suse.com/1165985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167629",
        "url": "https://bugzilla.suse.com/1167629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168075",
        "url": "https://bugzilla.suse.com/1168075"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168295",
        "url": "https://bugzilla.suse.com/1168295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168424",
        "url": "https://bugzilla.suse.com/1168424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168829",
        "url": "https://bugzilla.suse.com/1168829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168854",
        "url": "https://bugzilla.suse.com/1168854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170056",
        "url": "https://bugzilla.suse.com/1170056"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170345",
        "url": "https://bugzilla.suse.com/1170345"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170778",
        "url": "https://bugzilla.suse.com/1170778"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-18255 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-18255/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12126 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12126/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12127 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12127/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12130 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12130/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-21008 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-21008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-11091 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-11091/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14615 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14895 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14895/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14897 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14901 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14901/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15213 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15213/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18660 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18660/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18675 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18675/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18683 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18683/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19052 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19052/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19062 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19062/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19066 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19073 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19073/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19074 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19319 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19319/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19332 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19332/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19447 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19447/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19523 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19523/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19524 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19524/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19525 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19525/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19527 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19527/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19530 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19530/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19531 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19531/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19532 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19532/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19533 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19533/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19534 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19534/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19535 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19535/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19536 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19536/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19537 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19537/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19767 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19768 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19965 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19966 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20096 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3701 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3701/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5108 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5108/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-9455 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-9455/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-9458 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-9458/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10690 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10690/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10720 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10720/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10942 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10942/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11494 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11494/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11608 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11608/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11609 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11609/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8647 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8649 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8649/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-9383 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-9383/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-05-26T14:11:09Z",
      "generator": {
        "date": "2020-05-26T14:11:09Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:1255-1",
      "initial_release_date": "2020-05-26T14:11:09Z",
      "revision_history": [
        {
          "date": "2020-05-26T14:11:09Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.121-92.129.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.aarch64",
                  "product_id": "cluster-md-kmp-vanilla-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-network-kmp-default-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "cluster-network-kmp-default-4.4.121-92.129.1.aarch64",
                  "product_id": "cluster-network-kmp-default-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.aarch64",
                  "product_id": "cluster-network-kmp-vanilla-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.4.121-92.129.1.aarch64",
                  "product_id": "dlm-kmp-default-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-vanilla-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "dlm-kmp-vanilla-4.4.121-92.129.1.aarch64",
                  "product_id": "dlm-kmp-vanilla-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.4.121-92.129.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.aarch64",
                  "product_id": "gfs2-kmp-vanilla-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "kernel-default-4.4.121-92.129.1.aarch64",
                  "product_id": "kernel-default-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.4.121-92.129.1.aarch64",
                  "product_id": "kernel-default-base-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.4.121-92.129.1.aarch64",
                  "product_id": "kernel-default-devel-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.4.121-92.129.1.aarch64",
                  "product_id": "kernel-default-extra-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-4.4.121-92.129.1.aarch64",
                  "product_id": "kernel-default-kgraft-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.4.121-92.129.1.aarch64",
                  "product_id": "kernel-obs-build-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.4.121-92.129.1.aarch64",
                  "product_id": "kernel-obs-qa-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.4.121-92.129.1.aarch64",
                  "product_id": "kernel-syms-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.4.121-92.129.1.aarch64",
                  "product_id": "kernel-vanilla-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.4.121-92.129.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.4.121-92.129.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.121-92.129.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.4.121-92.129.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.aarch64",
                  "product_id": "ocfs2-kmp-vanilla-4.4.121-92.129.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.4.121-92.129.1.noarch",
                "product": {
                  "name": "kernel-devel-4.4.121-92.129.1.noarch",
                  "product_id": "kernel-devel-4.4.121-92.129.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.4.121-92.129.1.noarch",
                "product": {
                  "name": "kernel-docs-4.4.121-92.129.1.noarch",
                  "product_id": "kernel-docs-4.4.121-92.129.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.4.121-92.129.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.4.121-92.129.1.noarch",
                  "product_id": "kernel-docs-html-4.4.121-92.129.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-pdf-4.4.121-92.129.1.noarch",
                "product": {
                  "name": "kernel-docs-pdf-4.4.121-92.129.1.noarch",
                  "product_id": "kernel-docs-pdf-4.4.121-92.129.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.4.121-92.129.1.noarch",
                "product": {
                  "name": "kernel-macros-4.4.121-92.129.1.noarch",
                  "product_id": "kernel-macros-4.4.121-92.129.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.4.121-92.129.1.noarch",
                "product": {
                  "name": "kernel-source-4.4.121-92.129.1.noarch",
                  "product_id": "kernel-source-4.4.121-92.129.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.4.121-92.129.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.4.121-92.129.1.noarch",
                  "product_id": "kernel-source-vanilla-4.4.121-92.129.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-debug-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-debug-4.4.121-92.129.1.ppc64le",
                  "product_id": "cluster-md-kmp-debug-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.ppc64le",
                  "product_id": "cluster-md-kmp-vanilla-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-network-kmp-debug-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "cluster-network-kmp-debug-4.4.121-92.129.1.ppc64le",
                  "product_id": "cluster-network-kmp-debug-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
                  "product_id": "cluster-network-kmp-default-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.ppc64le",
                  "product_id": "cluster-network-kmp-vanilla-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-debug-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-debug-4.4.121-92.129.1.ppc64le",
                  "product_id": "dlm-kmp-debug-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.4.121-92.129.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-vanilla-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-vanilla-4.4.121-92.129.1.ppc64le",
                  "product_id": "dlm-kmp-vanilla-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-debug-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-debug-4.4.121-92.129.1.ppc64le",
                  "product_id": "gfs2-kmp-debug-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.ppc64le",
                  "product_id": "gfs2-kmp-vanilla-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-debug-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-debug-base-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-extra-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-debug-extra-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-debug-extra-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-debug-kgraft-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-debug-kgraft-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-default-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-default-base-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-default-devel-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-default-extra-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-default-kgraft-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-obs-build-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-syms-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-vanilla-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.4.121-92.129.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
                  "product_id": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-debug-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-debug-4.4.121-92.129.1.ppc64le",
                  "product_id": "ocfs2-kmp-debug-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.4.121-92.129.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.ppc64le",
                  "product_id": "ocfs2-kmp-vanilla-4.4.121-92.129.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.121-92.129.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.s390x",
                  "product_id": "cluster-md-kmp-vanilla-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-network-kmp-default-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "cluster-network-kmp-default-4.4.121-92.129.1.s390x",
                  "product_id": "cluster-network-kmp-default-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.s390x",
                  "product_id": "cluster-network-kmp-vanilla-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.4.121-92.129.1.s390x",
                  "product_id": "dlm-kmp-default-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-vanilla-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "dlm-kmp-vanilla-4.4.121-92.129.1.s390x",
                  "product_id": "dlm-kmp-vanilla-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.4.121-92.129.1.s390x",
                  "product_id": "gfs2-kmp-default-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.s390x",
                  "product_id": "gfs2-kmp-vanilla-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-default-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-default-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-default-base-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-default-devel-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-default-extra-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-default-kgraft-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-default-man-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-obs-build-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-obs-qa-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-syms-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-syms-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-vanilla-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-vanilla-base-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.4.121-92.129.1.s390x",
                  "product_id": "kernel-zfcpdump-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.121-92.129.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.4.121-92.129.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.s390x",
                  "product_id": "ocfs2-kmp-vanilla-4.4.121-92.129.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-debug-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-debug-4.4.121-92.129.1.x86_64",
                  "product_id": "cluster-md-kmp-debug-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-vanilla-4.4.121-92.129.1.x86_64",
                  "product_id": "cluster-md-kmp-vanilla-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-network-kmp-debug-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "cluster-network-kmp-debug-4.4.121-92.129.1.x86_64",
                  "product_id": "cluster-network-kmp-debug-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
                  "product_id": "cluster-network-kmp-default-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "cluster-network-kmp-vanilla-4.4.121-92.129.1.x86_64",
                  "product_id": "cluster-network-kmp-vanilla-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-debug-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "dlm-kmp-debug-4.4.121-92.129.1.x86_64",
                  "product_id": "dlm-kmp-debug-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.4.121-92.129.1.x86_64",
                  "product_id": "dlm-kmp-default-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-vanilla-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "dlm-kmp-vanilla-4.4.121-92.129.1.x86_64",
                  "product_id": "dlm-kmp-vanilla-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-debug-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-debug-4.4.121-92.129.1.x86_64",
                  "product_id": "gfs2-kmp-debug-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.4.121-92.129.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-vanilla-4.4.121-92.129.1.x86_64",
                  "product_id": "gfs2-kmp-vanilla-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-debug-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-debug-base-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-debug-devel-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-extra-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-debug-extra-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-debug-extra-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-debug-kgraft-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-debug-kgraft-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-default-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-default-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-default-base-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-default-devel-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-default-extra-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-default-kgraft-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-obs-build-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-obs-qa-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-syms-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-vanilla-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.4.121-92.129.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
                  "product_id": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-debug-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-debug-4.4.121-92.129.1.x86_64",
                  "product_id": "ocfs2-kmp-debug-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.4.121-92.129.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-vanilla-4.4.121-92.129.1.x86_64",
                  "product_id": "ocfs2-kmp-vanilla-4.4.121-92.129.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud 7",
                "product": {
                  "name": "SUSE OpenStack Cloud 7",
                  "product_id": "SUSE OpenStack Cloud 7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:12:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP2-BCL",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP2-BCL",
                  "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-bcl:12:sp2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.121-92.129.1.s390x as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x"
        },
        "product_reference": "kernel-default-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.121-92.129.1.x86_64 as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.121-92.129.1.s390x as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x"
        },
        "product_reference": "kernel-default-base-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.121-92.129.1.x86_64 as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.121-92.129.1.s390x as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.121-92.129.1.x86_64 as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.4.121-92.129.1.s390x as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x"
        },
        "product_reference": "kernel-default-man-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.121-92.129.1.noarch as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.121-92.129.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.121-92.129.1.noarch as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.121-92.129.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.121-92.129.1.noarch as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch"
        },
        "product_reference": "kernel-source-4.4.121-92.129.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.121-92.129.1.s390x as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x"
        },
        "product_reference": "kernel-syms-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.121-92.129.1.x86_64 as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64 as component of SUSE OpenStack Cloud 7",
          "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-network-kmp-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-network-kmp-default-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x"
        },
        "product_reference": "cluster-network-kmp-default-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-network-kmp-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "kernel-default-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.121-92.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.121-92.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch"
        },
        "product_reference": "kernel-source-4.4.121-92.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "kernel-default-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x"
        },
        "product_reference": "kernel-default-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x"
        },
        "product_reference": "kernel-default-base-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x"
        },
        "product_reference": "kernel-default-man-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.121-92.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.121-92.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch"
        },
        "product_reference": "kernel-source-4.4.121-92.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.121-92.129.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.4.121-92.129.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.121-92.129.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x"
        },
        "product_reference": "kernel-syms-4.4.121-92.129.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.121-92.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.121-92.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.121-92.129.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch"
        },
        "product_reference": "kernel-source-4.4.121-92.129.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.121-92.129.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
          "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.121-92.129.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-18255",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-18255"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The perf_cpu_time_max_percent_handler function in kernel/events/core.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-18255",
          "url": "https://www.suse.com/security/cve/CVE-2017-18255"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-18255",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087813 for CVE-2017-18255",
          "url": "https://bugzilla.suse.com/1087813"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-18255"
    },
    {
      "cve": "CVE-2018-12126",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12126"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12126",
          "url": "https://www.suse.com/security/cve/CVE-2018-12126"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1103186 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1103186"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1111331 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1111331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1135409 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1135409"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1135524 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1135524"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1137916 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1137916"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1138534 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1138534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1141977 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1141977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149725 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1149725"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149726 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1149726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149729 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1149729"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2018-12126",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-12126"
    },
    {
      "cve": "CVE-2018-12127",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12127"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12127",
          "url": "https://www.suse.com/security/cve/CVE-2018-12127"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1103186 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1103186"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1111331 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1111331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1135409 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1135409"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1138534 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1138534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1141977 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1141977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2018-12127",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-12127"
    },
    {
      "cve": "CVE-2018-12130",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12130"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12130",
          "url": "https://www.suse.com/security/cve/CVE-2018-12130"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1103186 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1103186"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1111331 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1111331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1135409 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1135409"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1137916 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1137916"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1138534 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1138534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1141977 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1141977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2018-12130",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-12130"
    },
    {
      "cve": "CVE-2018-21008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-21008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 4.16.7. A use-after-free can be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-21008",
          "url": "https://www.suse.com/security/cve/CVE-2018-21008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149591 for CVE-2018-21008",
          "url": "https://bugzilla.suse.com/1149591"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-21008"
    },
    {
      "cve": "CVE-2019-11091",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-11091"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-11091",
          "url": "https://www.suse.com/security/cve/CVE-2019-11091"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1103186 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1103186"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1111331 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1111331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133319 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1133319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1135394 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1135394"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1138043 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1138043"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1138534 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1138534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1141977 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1141977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2019-11091",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-11091"
    },
    {
      "cve": "CVE-2019-14615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14615",
          "url": "https://www.suse.com/security/cve/CVE-2019-14615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160195 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1160195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165881 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1165881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14615"
    },
    {
      "cve": "CVE-2019-14895",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14895"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14895",
          "url": "https://www.suse.com/security/cve/CVE-2019-14895"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157042 for CVE-2019-14895",
          "url": "https://bugzilla.suse.com/1157042"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157158 for CVE-2019-14895",
          "url": "https://bugzilla.suse.com/1157158"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173100 for CVE-2019-14895",
          "url": "https://bugzilla.suse.com/1173100"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173660 for CVE-2019-14895",
          "url": "https://bugzilla.suse.com/1173660"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14895"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-14897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14897",
          "url": "https://www.suse.com/security/cve/CVE-2019-14897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157155 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1157155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160467 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14897"
    },
    {
      "cve": "CVE-2019-14901",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14901"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14901",
          "url": "https://www.suse.com/security/cve/CVE-2019-14901"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157042 for CVE-2019-14901",
          "url": "https://bugzilla.suse.com/1157042"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173661 for CVE-2019-14901",
          "url": "https://bugzilla.suse.com/1173661"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14901"
    },
    {
      "cve": "CVE-2019-15213",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15213"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15213",
          "url": "https://www.suse.com/security/cve/CVE-2019-15213"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1146519"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146544 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1146544"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-15213",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15213"
    },
    {
      "cve": "CVE-2019-18660",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18660"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18660",
          "url": "https://www.suse.com/security/cve/CVE-2019-18660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157038 for CVE-2019-18660",
          "url": "https://bugzilla.suse.com/1157038"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157923 for CVE-2019-18660",
          "url": "https://bugzilla.suse.com/1157923"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18660"
    },
    {
      "cve": "CVE-2019-18675",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18675"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18675",
          "url": "https://www.suse.com/security/cve/CVE-2019-18675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157804 for CVE-2019-18675",
          "url": "https://bugzilla.suse.com/1157804"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18675"
    },
    {
      "cve": "CVE-2019-18683",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18683"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18683",
          "url": "https://www.suse.com/security/cve/CVE-2019-18683"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1155897 for CVE-2019-18683",
          "url": "https://bugzilla.suse.com/1155897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173868 for CVE-2019-18683",
          "url": "https://bugzilla.suse.com/1173868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18683"
    },
    {
      "cve": "CVE-2019-19052",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19052"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19052",
          "url": "https://www.suse.com/security/cve/CVE-2019-19052"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157324 for CVE-2019-19052",
          "url": "https://bugzilla.suse.com/1157324"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19052"
    },
    {
      "cve": "CVE-2019-19062",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19062"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19062",
          "url": "https://www.suse.com/security/cve/CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157333 for CVE-2019-19062",
          "url": "https://bugzilla.suse.com/1157333"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19062"
    },
    {
      "cve": "CVE-2019-19066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19066",
          "url": "https://www.suse.com/security/cve/CVE-2019-19066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157303 for CVE-2019-19066",
          "url": "https://bugzilla.suse.com/1157303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19066"
    },
    {
      "cve": "CVE-2019-19073",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19073"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19073",
          "url": "https://www.suse.com/security/cve/CVE-2019-19073"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157070 for CVE-2019-19073",
          "url": "https://bugzilla.suse.com/1157070"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19073"
    },
    {
      "cve": "CVE-2019-19074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19074",
          "url": "https://www.suse.com/security/cve/CVE-2019-19074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157143 for CVE-2019-19074",
          "url": "https://bugzilla.suse.com/1157143"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19074"
    },
    {
      "cve": "CVE-2019-19319",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19319"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19319",
          "url": "https://www.suse.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158021 for CVE-2019-19319",
          "url": "https://bugzilla.suse.com/1158021"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19319"
    },
    {
      "cve": "CVE-2019-19332",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19332"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19332",
          "url": "https://www.suse.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158827 for CVE-2019-19332",
          "url": "https://bugzilla.suse.com/1158827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19332"
    },
    {
      "cve": "CVE-2019-19447",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19447"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19447",
          "url": "https://www.suse.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158819 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1158819"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173869 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1173869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-19447"
    },
    {
      "cve": "CVE-2019-19523",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19523"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19523",
          "url": "https://www.suse.com/security/cve/CVE-2019-19523"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158823 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19523"
    },
    {
      "cve": "CVE-2019-19524",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19524"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19524",
          "url": "https://www.suse.com/security/cve/CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19524",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158413 for CVE-2019-19524",
          "url": "https://bugzilla.suse.com/1158413"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19524",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19524"
    },
    {
      "cve": "CVE-2019-19525",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19525"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19525",
          "url": "https://www.suse.com/security/cve/CVE-2019-19525"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19525",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158417 for CVE-2019-19525",
          "url": "https://bugzilla.suse.com/1158417"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19525",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19525"
    },
    {
      "cve": "CVE-2019-19527",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19527"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19527",
          "url": "https://www.suse.com/security/cve/CVE-2019-19527"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158900 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19527"
    },
    {
      "cve": "CVE-2019-19530",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19530"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19530",
          "url": "https://www.suse.com/security/cve/CVE-2019-19530"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19530",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158410 for CVE-2019-19530",
          "url": "https://bugzilla.suse.com/1158410"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19530",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19530"
    },
    {
      "cve": "CVE-2019-19531",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19531"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19531",
          "url": "https://www.suse.com/security/cve/CVE-2019-19531"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19531",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158427 for CVE-2019-19531",
          "url": "https://bugzilla.suse.com/1158427"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158445 for CVE-2019-19531",
          "url": "https://bugzilla.suse.com/1158445"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19531",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19531"
    },
    {
      "cve": "CVE-2019-19532",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19532"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19532",
          "url": "https://www.suse.com/security/cve/CVE-2019-19532"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158823 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158824 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19532"
    },
    {
      "cve": "CVE-2019-19533",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19533"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19533",
          "url": "https://www.suse.com/security/cve/CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19533",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19533",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19533"
    },
    {
      "cve": "CVE-2019-19534",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19534"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19534",
          "url": "https://www.suse.com/security/cve/CVE-2019-19534"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19534",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158398 for CVE-2019-19534",
          "url": "https://bugzilla.suse.com/1158398"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19534",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19534"
    },
    {
      "cve": "CVE-2019-19535",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19535"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19535",
          "url": "https://www.suse.com/security/cve/CVE-2019-19535"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158903 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19535"
    },
    {
      "cve": "CVE-2019-19536",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19536"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19536",
          "url": "https://www.suse.com/security/cve/CVE-2019-19536"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19536",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158394 for CVE-2019-19536",
          "url": "https://bugzilla.suse.com/1158394"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19536",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19536"
    },
    {
      "cve": "CVE-2019-19537",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19537"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19537",
          "url": "https://www.suse.com/security/cve/CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158904 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158904"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19537"
    },
    {
      "cve": "CVE-2019-19767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19767",
          "url": "https://www.suse.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159297 for CVE-2019-19767",
          "url": "https://bugzilla.suse.com/1159297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19767"
    },
    {
      "cve": "CVE-2019-19768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19768",
          "url": "https://www.suse.com/security/cve/CVE-2019-19768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159285 for CVE-2019-19768",
          "url": "https://bugzilla.suse.com/1159285"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19768"
    },
    {
      "cve": "CVE-2019-19965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19965",
          "url": "https://www.suse.com/security/cve/CVE-2019-19965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159911 for CVE-2019-19965",
          "url": "https://bugzilla.suse.com/1159911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19965"
    },
    {
      "cve": "CVE-2019-19966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19966",
          "url": "https://www.suse.com/security/cve/CVE-2019-19966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159841 for CVE-2019-19966",
          "url": "https://bugzilla.suse.com/1159841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19966"
    },
    {
      "cve": "CVE-2019-20054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20054",
          "url": "https://www.suse.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159910 for CVE-2019-20054",
          "url": "https://bugzilla.suse.com/1159910"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20054"
    },
    {
      "cve": "CVE-2019-20096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20096",
          "url": "https://www.suse.com/security/cve/CVE-2019-20096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159908 for CVE-2019-20096",
          "url": "https://bugzilla.suse.com/1159908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20096"
    },
    {
      "cve": "CVE-2019-3701",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3701"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user \"root\" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller\u0027s I/O memory when processing can-gw manipulated outgoing frames.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3701",
          "url": "https://www.suse.com/security/cve/CVE-2019-3701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1120386 for CVE-2019-3701",
          "url": "https://bugzilla.suse.com/1120386"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3701"
    },
    {
      "cve": "CVE-2019-5108",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5108"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5108",
          "url": "https://www.suse.com/security/cve/CVE-2019-5108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159912 for CVE-2019-5108",
          "url": "https://bugzilla.suse.com/1159912"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159913 for CVE-2019-5108",
          "url": "https://bugzilla.suse.com/1159913"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5108"
    },
    {
      "cve": "CVE-2019-9455",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-9455"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-9455",
          "url": "https://www.suse.com/security/cve/CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170345 for CVE-2019-9455",
          "url": "https://bugzilla.suse.com/1170345"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-9455"
    },
    {
      "cve": "CVE-2019-9458",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-9458"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-9458",
          "url": "https://www.suse.com/security/cve/CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168295 for CVE-2019-9458",
          "url": "https://bugzilla.suse.com/1168295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173963 for CVE-2019-9458",
          "url": "https://bugzilla.suse.com/1173963"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-9458"
    },
    {
      "cve": "CVE-2020-10690",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10690"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10690",
          "url": "https://www.suse.com/security/cve/CVE-2020-10690"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170056 for CVE-2020-10690",
          "url": "https://bugzilla.suse.com/1170056"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10690"
    },
    {
      "cve": "CVE-2020-10720",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10720"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10720",
          "url": "https://www.suse.com/security/cve/CVE-2020-10720"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170778 for CVE-2020-10720",
          "url": "https://bugzilla.suse.com/1170778"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10720"
    },
    {
      "cve": "CVE-2020-10942",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10942"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10942",
          "url": "https://www.suse.com/security/cve/CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1167629 for CVE-2020-10942",
          "url": "https://bugzilla.suse.com/1167629"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10942"
    },
    {
      "cve": "CVE-2020-11494",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11494"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11494",
          "url": "https://www.suse.com/security/cve/CVE-2020-11494"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168424 for CVE-2020-11494",
          "url": "https://bugzilla.suse.com/1168424"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-11494"
    },
    {
      "cve": "CVE-2020-11608",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11608"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11608",
          "url": "https://www.suse.com/security/cve/CVE-2020-11608"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168829 for CVE-2020-11608",
          "url": "https://bugzilla.suse.com/1168829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-11608"
    },
    {
      "cve": "CVE-2020-11609",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11609"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11609",
          "url": "https://www.suse.com/security/cve/CVE-2020-11609"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168854 for CVE-2020-11609",
          "url": "https://bugzilla.suse.com/1168854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-11609"
    },
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-8647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8647",
          "url": "https://www.suse.com/security/cve/CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162929 for CVE-2020-8647",
          "url": "https://bugzilla.suse.com/1162929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164078 for CVE-2020-8647",
          "url": "https://bugzilla.suse.com/1164078"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8647"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8649",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8649"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8649",
          "url": "https://www.suse.com/security/cve/CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162929 for CVE-2020-8649",
          "url": "https://bugzilla.suse.com/1162929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162931 for CVE-2020-8649",
          "url": "https://bugzilla.suse.com/1162931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8649"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    },
    {
      "cve": "CVE-2020-9383",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-9383"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
          "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
          "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-9383",
          "url": "https://www.suse.com/security/cve/CVE-2020-9383"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165111 for CVE-2020-9383",
          "url": "https://bugzilla.suse.com/1165111"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.129.1.noarch",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.s390x",
            "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.129.1.x86_64",
            "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_129-default-1-3.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-05-26T14:11:09Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-9383"
    }
  ]
}
  suse-su-2020:1663-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15 kernel was updated receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n  This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-9383: Fixed an out-of-bounds read due to improper error condition check of FDC index (bsc#1165111).\n- CVE-2020-8992: Fixed an issue which could have allowed attackers to cause a soft lockup via a crafted journal size (bsc#1164069).\n- CVE-2020-8834: Fixed a stack corruption which could have lead to kernel panic (bsc#1168276).\n- CVE-2020-8649: Fixed a use-after-free in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).\n- CVE-2020-8648: Fixed a use-after-free in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).\n- CVE-2020-8647: Fixed a use-after-free in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).\n- CVE-2020-8428: Fixed a use-after-free which could have allowed local users to cause a denial of service (bsc#1162109).\n- CVE-2020-7053: Fixed a use-after-free in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c (bsc#1160966).\n- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).\n- CVE-2020-11609: Fixed a null pointer dereference due to improper handling of descriptors (bsc#1168854).\n- CVE-2020-11608: Fixed a null pointer dereferences via a crafted USB (bsc#1168829).\n- CVE-2020-11494: Fixed an issue which could have allowed attackers to read uninitialized can_frame data (bsc#1168424).\n- CVE-2020-10942: Fixed a kernel stack corruption via crafted system calls (bsc#1167629).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook  where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9458: Fixed a use after free due to a race condition which could have led to privilege escalation of privilege (bsc#1168295).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-3701: Fixed an issue in can_can_gw_rcv, which could cause a system crash (bsc#1120386).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20810: Fixed a memory leak in due to not calling of snd_card_free (bsc#1172458).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which could have caused denial of service (bsc#1159908).\n- CVE-2019-20095: Fixed an improper error-handling cases that did not free allocated hostcmd memory which was causing memory leak (bsc#1159909).\n- CVE-2019-20054: Fixed a null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bsc#1159910).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() which could have caused denial of service (bsc#1159841).\n- CVE-2019-19965: Fixed a null pointer dereference, due to mishandling of port disconnection during discovery (bsc#1159911).\n- CVE-2019-19770: Fixed a use-after-free in the debugfs_remove function (bsc#1159198).\n- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bsc#1159285).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2019-19447: Fixed a user after free via a crafted ext4 filesystem image (bsc#1158819).\n- CVE-2019-19319: Fixed a user after free when a large old_size value is used in a memset call (bsc#1158021).\n- CVE-2019-19318: Fixed a use after free via a crafted btrfs image (bsc#1158026).\n- CVE-2019-19054: Fixed a memory leak in the cx23888_ir_probe() which could have allowed attackers to cause a denial of service (bsc#1161518).\n- CVE-2019-19045: Fixed a memory leak in which could have allowed attackers to cause a denial of service (bsc#1161522).\n- CVE-2019-19036: Fixed a null pointer dereference in btrfs_root_node (bsc#1157692).\n- CVE-2019-16994: Fixed a memory leak which might have caused denial of service (bsc#1161523).\n- CVE-2019-14897: Fixed a stack overflow in Marvell Wifi Driver (bsc#1157155).\n- CVE-2019-14896: Fixed a heap overflow in Marvell Wifi Driver (bsc#1157157).\n- CVE-2019-14615: Fixed an improper control flow in certain data structures which could have led to information disclosure (bsc#1160195).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: cs4349: Use PM ops \u0027cs4349_runtime_pm\u0027 (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- a typo in %kernel_base_conflicts macro name\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcma: remove set but not used variable \u0027sizel\u0027 (git-fixes).\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1051510).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cgroup: pids: use atomic64_t for pids-\u003elimit (bsc#1161514).\n- CIFS: add support for flock (bsc#1144333).\n- CIFS: Close cached root handle only if it had a lease (bsc#1144333).\n- CIFS: Close open handle after interrupted close (bsc#1144333).\n- CIFS: close the shared root handle on tree disconnect (bsc#1144333).\n- CIFS: Do not miss cancelled OPEN responses (bsc#1144333).\n- CIFS: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- CIFS: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- CIFS: Fix mount options set in automount (bsc#1144333).\n- CIFS: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- CIFS: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- CIFS: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- CIFS: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- CIFS: Properly process SMB3 lease breaks (bsc#1144333).\n- CIFS: remove set but not used variables \u0027cinode\u0027 and \u0027netfid\u0027 (bsc#1144333).\n- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170621).\n- copy/pasted \u0027Recommends:\u0027 instead of \u0027Provides:\u0027, \u0027Obsoletes:\u0027 and \u0027Conflicts:\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn-\u003ealg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- debugfs: add support for more elaborate -\u003ed_fsdata (bsc#1159198  bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: call debugfs_real_fops() only after debugfs_file_get() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: convert to debugfs_file_get() and -put() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: debugfs_real_fops(): drop __must_hold sparse annotation (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: debugfs_use_start/finish do not exist anymore (bsc#1159198). Prerequisite for bsc#1159198.\n- debugfs: defer debugfs_fsdata allocation to first usage (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: fix debugfs_real_fops() build error (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: implement per-file removal protection (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: purge obsolete SRCU based removal protection (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- debugfs: simplify __debugfs_remove_file() (bsc#1159198). Prerequisite for bsc#1159198.\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170617).\n- drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170617).\n- drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).\n- drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170617).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915: Add missing include file \u003clinux/math64.h\u003e (bsc#1051510).\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- e100: Fix passing zero to \u0027PTR_ERR\u0027 warning in e100_load_ucode_wait (bsc#1051510).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- firestream: fix memory leaks (bsc#1051510).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- Fix partial checked out tree build ... so that bisection does not break.\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- futex: Prevent robust futex exit race (bsc#1161555).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- IB/hfi1: convert to debugfs_file_get() and -put() (bsc#1159198 bsc#1109911). Prerequisite for bsc#1159198.\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- Input: add safety guards to input_set_keycode() (bsc#1168075).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- kABI: protect struct sctp_ep_common (kabi).\n- kABI: restore debugfs_remove_recursive() (bsc#1159198).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- KEYS: reaching the keys quotas correctly (bsc#1171689).\n- KVM: fix spectrev1 gadgets (bsc#1164705).\n- KVM: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).\n- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).\n- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).\n- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).\n- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).\n- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).\n- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).\n- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).\n- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).\n- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).\n- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- md/raid0: Fix buffer overflow at debug print (bsc#1164051).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov519: add missing endpoint sanity checks (bsc#1168829).\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: stv06xx: add missing descriptor sanity checks (bsc#1168854).\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- missing escaping of backslashes in macro expansions Fixes: f3b74b0ae86b (\u0027rpm/kernel-subpackage-spec: Unify dependency handling.\u0027) Fixes: 3fd22e219f77 (\u0027rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\u0027)\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: Revert \u0027mmc: sdhci-of-esdhc: add erratum A-009204 support\u0027 (bsc#1051510).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: ena: Add PCI shutdown handler to allow safe kexec (bsc#1167421, bsc#1167423).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- NFC: pn533: fix bulk-message timeout (bsc#1051510).\n- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- Revert \u0027Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers\u0027 (bsc#1051510).\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027mmc: sdhci: Fix incorrect switch to HS mode\u0027 (bsc#1051510).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in \u0027max8997_rtc_read_alarm()\u0027 (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf\u0027s type to u8 in s35390a_init (bsc#1051510).\n- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- smb3: Fix persistent handles reconnect (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: remove confusing dmesg when mounting with encryption (\u0027seal\u0027) (bsc#1144333).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- Staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1160560).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- USB: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- USB: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- USB: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- USB: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- USB: core: urb: fix URB structure initialization function (bsc#1051510).\n- USB: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- USB: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- USB: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- USB: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- USB: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- USB: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- USB: gadget: pch_udc: fix use after free (bsc#1051510).\n- USB: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- USB: gadget: Zero ffs_io_data (bsc#1051510).\n- USB: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- USB: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- USB: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- USB: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- USB: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- USB: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- USB: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- USB: serial: io_edgeport: use irqsave() in USB\u0027s complete callback (bsc#1051510).\n- USB: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- USB: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- USB: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- USB: serial: keyspan: handle unbound ports (bsc#1051510).\n- USB: serial: opticon: fix control-message timeouts (bsc#1051510).\n- USB: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- USB: serial: quatech2: handle unbound ports (bsc#1051510).\n- USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- USB: serial: suppress driver bind attributes (bsc#1051510).\n- USB: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- USB: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- USB: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- USB: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170621).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617).\n- x86/Hyper-V: report value of misc_features (git-fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/mm: Split vmalloc_sync_all() (bsc#1165741).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).\n- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-1663,SUSE-SLE-Module-Live-Patching-15-2020-1663,SUSE-SLE-Product-HA-15-2020-1663,SUSE-SLE-Product-HPC-15-2020-1663,SUSE-SLE-Product-SLES-15-2020-1663,SUSE-SLE-Product-SLES_SAP-15-2020-1663",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1663-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:1663-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201663-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:1663-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050244",
        "url": "https://bugzilla.suse.com/1050244"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051858",
        "url": "https://bugzilla.suse.com/1051858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1058115",
        "url": "https://bugzilla.suse.com/1058115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061840",
        "url": "https://bugzilla.suse.com/1061840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085030",
        "url": "https://bugzilla.suse.com/1085030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086301",
        "url": "https://bugzilla.suse.com/1086301"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086313",
        "url": "https://bugzilla.suse.com/1086313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086314",
        "url": "https://bugzilla.suse.com/1086314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1089895",
        "url": "https://bugzilla.suse.com/1089895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1109911",
        "url": "https://bugzilla.suse.com/1109911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118338",
        "url": "https://bugzilla.suse.com/1118338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1120386",
        "url": "https://bugzilla.suse.com/1120386"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1134973",
        "url": "https://bugzilla.suse.com/1134973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1143959",
        "url": "https://bugzilla.suse.com/1143959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144333",
        "url": "https://bugzilla.suse.com/1144333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151910",
        "url": "https://bugzilla.suse.com/1151910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151927",
        "url": "https://bugzilla.suse.com/1151927"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153917",
        "url": "https://bugzilla.suse.com/1153917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154243",
        "url": "https://bugzilla.suse.com/1154243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154824",
        "url": "https://bugzilla.suse.com/1154824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156286",
        "url": "https://bugzilla.suse.com/1156286"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157155",
        "url": "https://bugzilla.suse.com/1157155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157157",
        "url": "https://bugzilla.suse.com/1157157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157692",
        "url": "https://bugzilla.suse.com/1157692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158013",
        "url": "https://bugzilla.suse.com/1158013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158021",
        "url": "https://bugzilla.suse.com/1158021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158026",
        "url": "https://bugzilla.suse.com/1158026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158265",
        "url": "https://bugzilla.suse.com/1158265"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158819",
        "url": "https://bugzilla.suse.com/1158819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159028",
        "url": "https://bugzilla.suse.com/1159028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159198",
        "url": "https://bugzilla.suse.com/1159198"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159271",
        "url": "https://bugzilla.suse.com/1159271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159285",
        "url": "https://bugzilla.suse.com/1159285"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159394",
        "url": "https://bugzilla.suse.com/1159394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159483",
        "url": "https://bugzilla.suse.com/1159483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159484",
        "url": "https://bugzilla.suse.com/1159484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159569",
        "url": "https://bugzilla.suse.com/1159569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159588",
        "url": "https://bugzilla.suse.com/1159588"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159841",
        "url": "https://bugzilla.suse.com/1159841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159908",
        "url": "https://bugzilla.suse.com/1159908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159909",
        "url": "https://bugzilla.suse.com/1159909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159910",
        "url": "https://bugzilla.suse.com/1159910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159911",
        "url": "https://bugzilla.suse.com/1159911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159955",
        "url": "https://bugzilla.suse.com/1159955"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160195",
        "url": "https://bugzilla.suse.com/1160195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160210",
        "url": "https://bugzilla.suse.com/1160210"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160211",
        "url": "https://bugzilla.suse.com/1160211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160218",
        "url": "https://bugzilla.suse.com/1160218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160433",
        "url": "https://bugzilla.suse.com/1160433"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160442",
        "url": "https://bugzilla.suse.com/1160442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160476",
        "url": "https://bugzilla.suse.com/1160476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160560",
        "url": "https://bugzilla.suse.com/1160560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160755",
        "url": "https://bugzilla.suse.com/1160755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160756",
        "url": "https://bugzilla.suse.com/1160756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160784",
        "url": "https://bugzilla.suse.com/1160784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160787",
        "url": "https://bugzilla.suse.com/1160787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160802",
        "url": "https://bugzilla.suse.com/1160802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160803",
        "url": "https://bugzilla.suse.com/1160803"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160804",
        "url": "https://bugzilla.suse.com/1160804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160917",
        "url": "https://bugzilla.suse.com/1160917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160966",
        "url": "https://bugzilla.suse.com/1160966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161087",
        "url": "https://bugzilla.suse.com/1161087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161514",
        "url": "https://bugzilla.suse.com/1161514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161518",
        "url": "https://bugzilla.suse.com/1161518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161522",
        "url": "https://bugzilla.suse.com/1161522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161523",
        "url": "https://bugzilla.suse.com/1161523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161549",
        "url": "https://bugzilla.suse.com/1161549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161552",
        "url": "https://bugzilla.suse.com/1161552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161555",
        "url": "https://bugzilla.suse.com/1161555"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161674",
        "url": "https://bugzilla.suse.com/1161674"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161931",
        "url": "https://bugzilla.suse.com/1161931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161933",
        "url": "https://bugzilla.suse.com/1161933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161934",
        "url": "https://bugzilla.suse.com/1161934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161935",
        "url": "https://bugzilla.suse.com/1161935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161936",
        "url": "https://bugzilla.suse.com/1161936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161937",
        "url": "https://bugzilla.suse.com/1161937"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161951",
        "url": "https://bugzilla.suse.com/1161951"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162067",
        "url": "https://bugzilla.suse.com/1162067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162109",
        "url": "https://bugzilla.suse.com/1162109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162139",
        "url": "https://bugzilla.suse.com/1162139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162929",
        "url": "https://bugzilla.suse.com/1162929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162931",
        "url": "https://bugzilla.suse.com/1162931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163971",
        "url": "https://bugzilla.suse.com/1163971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164051",
        "url": "https://bugzilla.suse.com/1164051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164069",
        "url": "https://bugzilla.suse.com/1164069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164078",
        "url": "https://bugzilla.suse.com/1164078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164705",
        "url": "https://bugzilla.suse.com/1164705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164712",
        "url": "https://bugzilla.suse.com/1164712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164727",
        "url": "https://bugzilla.suse.com/1164727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164728",
        "url": "https://bugzilla.suse.com/1164728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164729",
        "url": "https://bugzilla.suse.com/1164729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164730",
        "url": "https://bugzilla.suse.com/1164730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164731",
        "url": "https://bugzilla.suse.com/1164731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164732",
        "url": "https://bugzilla.suse.com/1164732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164733",
        "url": "https://bugzilla.suse.com/1164733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164734",
        "url": "https://bugzilla.suse.com/1164734"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164735",
        "url": "https://bugzilla.suse.com/1164735"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164871",
        "url": "https://bugzilla.suse.com/1164871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165111",
        "url": "https://bugzilla.suse.com/1165111"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165741",
        "url": "https://bugzilla.suse.com/1165741"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165873",
        "url": "https://bugzilla.suse.com/1165873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165881",
        "url": "https://bugzilla.suse.com/1165881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165984",
        "url": "https://bugzilla.suse.com/1165984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165985",
        "url": "https://bugzilla.suse.com/1165985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166969",
        "url": "https://bugzilla.suse.com/1166969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167421",
        "url": "https://bugzilla.suse.com/1167421"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167423",
        "url": "https://bugzilla.suse.com/1167423"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167629",
        "url": "https://bugzilla.suse.com/1167629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168075",
        "url": "https://bugzilla.suse.com/1168075"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168276",
        "url": "https://bugzilla.suse.com/1168276"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168295",
        "url": "https://bugzilla.suse.com/1168295"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168424",
        "url": "https://bugzilla.suse.com/1168424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168670",
        "url": "https://bugzilla.suse.com/1168670"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168829",
        "url": "https://bugzilla.suse.com/1168829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168854",
        "url": "https://bugzilla.suse.com/1168854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169390",
        "url": "https://bugzilla.suse.com/1169390"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169514",
        "url": "https://bugzilla.suse.com/1169514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169625",
        "url": "https://bugzilla.suse.com/1169625"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170056",
        "url": "https://bugzilla.suse.com/1170056"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170345",
        "url": "https://bugzilla.suse.com/1170345"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170617",
        "url": "https://bugzilla.suse.com/1170617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170618",
        "url": "https://bugzilla.suse.com/1170618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170621",
        "url": "https://bugzilla.suse.com/1170621"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170778",
        "url": "https://bugzilla.suse.com/1170778"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170901",
        "url": "https://bugzilla.suse.com/1170901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171098",
        "url": "https://bugzilla.suse.com/1171098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171189",
        "url": "https://bugzilla.suse.com/1171189"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171191",
        "url": "https://bugzilla.suse.com/1171191"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171195",
        "url": "https://bugzilla.suse.com/1171195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171202",
        "url": "https://bugzilla.suse.com/1171202"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171205",
        "url": "https://bugzilla.suse.com/1171205"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171217",
        "url": "https://bugzilla.suse.com/1171217"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171218",
        "url": "https://bugzilla.suse.com/1171218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171219",
        "url": "https://bugzilla.suse.com/1171219"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171220",
        "url": "https://bugzilla.suse.com/1171220"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171689",
        "url": "https://bugzilla.suse.com/1171689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171982",
        "url": "https://bugzilla.suse.com/1171982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171983",
        "url": "https://bugzilla.suse.com/1171983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172221",
        "url": "https://bugzilla.suse.com/1172221"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172317",
        "url": "https://bugzilla.suse.com/1172317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172453",
        "url": "https://bugzilla.suse.com/1172453"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172458",
        "url": "https://bugzilla.suse.com/1172458"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-1000199 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-1000199/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14615 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14897 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16994 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16994/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19036 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19045 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19318 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19318/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19319 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19319/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19447 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19447/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19462 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19462/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19768 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19770 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19770/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19965 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19966 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20095 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20096 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20810 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20810/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20812 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20812/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3701 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3701/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-9455 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-9455/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-9458 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-9458/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0543 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10690 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10690/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10711 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10711/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10720 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10720/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10751 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10751/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10757 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10757/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10942 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10942/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11494 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11494/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11608 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11608/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11609 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11609/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-11669 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-11669/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12114 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12114/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12464 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12464/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12652 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12652/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12653 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12654 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12654/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12655 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12655/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12656 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12657 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12657/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12769 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12769/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-13143 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-13143/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-7053 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-7053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8428 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8428/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8647 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8649 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8649/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8834 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8834/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-9383 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-9383/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-06-18T09:17:44Z",
      "generator": {
        "date": "2020-06-18T09:17:44Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:1663-1",
      "initial_release_date": "2020-06-18T09:17:44Z",
      "revision_history": [
        {
          "date": "2020-06-18T09:17:44Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-150.52.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-150.52.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-default-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-default-livepatch-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.aarch64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-150.52.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
                  "product_id": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-150.52.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-150.52.1.noarch",
                  "product_id": "kernel-devel-4.12.14-150.52.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-150.52.1.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-150.52.1.noarch",
                  "product_id": "kernel-docs-4.12.14-150.52.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-150.52.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-150.52.1.noarch",
                  "product_id": "kernel-docs-html-4.12.14-150.52.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-150.52.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-150.52.1.noarch",
                  "product_id": "kernel-macros-4.12.14-150.52.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-150.52.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-150.52.1.noarch",
                  "product_id": "kernel-source-4.12.14-150.52.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-150.52.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-150.52.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-150.52.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-150.52.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-debug-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-debug-livepatch-devel-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-debug-livepatch-devel-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.ppc64le",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-150.52.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
                  "product_id": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-150.52.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-150.52.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-150.52.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-default-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-default-livepatch-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-syms-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-150.52.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-150.52.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-150.52.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-150.52.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-150.52.1.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-150.52.1.s390x",
                  "product_id": "reiserfs-kmp-default-4.12.14-150.52.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-150.52.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-150.52.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-debug-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-debug-livepatch-devel-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-debug-livepatch-devel-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-default-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-default-livepatch-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.x86_64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-150.52.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
                  "product_id": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15",
                  "product_id": "SUSE Linux Enterprise Live Patching 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 15",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 15",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
          "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-150.52.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-150.52.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-150.52.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-150.52.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-150.52.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-150.52.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.52.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-150.52.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.52.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-150.52.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-150.52.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-150.52.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-150.52.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-1000199",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-1000199"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-1000199",
          "url": "https://www.suse.com/security/cve/CVE-2018-1000199"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1089895 for CVE-2018-1000199",
          "url": "https://bugzilla.suse.com/1089895"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1090036 for CVE-2018-1000199",
          "url": "https://bugzilla.suse.com/1090036"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-1000199"
    },
    {
      "cve": "CVE-2019-14615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14615",
          "url": "https://www.suse.com/security/cve/CVE-2019-14615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160195 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1160195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165881 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1165881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14615"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-14897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14897",
          "url": "https://www.suse.com/security/cve/CVE-2019-14897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157155 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1157155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160467 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14897"
    },
    {
      "cve": "CVE-2019-16994",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16994"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16994",
          "url": "https://www.suse.com/security/cve/CVE-2019-16994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161523 for CVE-2019-16994",
          "url": "https://bugzilla.suse.com/1161523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16994"
    },
    {
      "cve": "CVE-2019-19036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19036",
          "url": "https://www.suse.com/security/cve/CVE-2019-19036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157692 for CVE-2019-19036",
          "url": "https://bugzilla.suse.com/1157692"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19036"
    },
    {
      "cve": "CVE-2019-19045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19045",
          "url": "https://www.suse.com/security/cve/CVE-2019-19045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161522 for CVE-2019-19045",
          "url": "https://bugzilla.suse.com/1161522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19045"
    },
    {
      "cve": "CVE-2019-19054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19054",
          "url": "https://www.suse.com/security/cve/CVE-2019-19054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161518 for CVE-2019-19054",
          "url": "https://bugzilla.suse.com/1161518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19054"
    },
    {
      "cve": "CVE-2019-19318",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19318"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19318",
          "url": "https://www.suse.com/security/cve/CVE-2019-19318"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158026 for CVE-2019-19318",
          "url": "https://bugzilla.suse.com/1158026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19318"
    },
    {
      "cve": "CVE-2019-19319",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19319"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19319",
          "url": "https://www.suse.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158021 for CVE-2019-19319",
          "url": "https://bugzilla.suse.com/1158021"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19319"
    },
    {
      "cve": "CVE-2019-19447",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19447"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19447",
          "url": "https://www.suse.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158819 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1158819"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173869 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1173869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-19447"
    },
    {
      "cve": "CVE-2019-19462",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19462"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19462",
          "url": "https://www.suse.com/security/cve/CVE-2019-19462"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158265 for CVE-2019-19462",
          "url": "https://bugzilla.suse.com/1158265"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19462"
    },
    {
      "cve": "CVE-2019-19768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19768",
          "url": "https://www.suse.com/security/cve/CVE-2019-19768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159285 for CVE-2019-19768",
          "url": "https://bugzilla.suse.com/1159285"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19768"
    },
    {
      "cve": "CVE-2019-19770",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19770"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** DISPUTED ** In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19770",
          "url": "https://www.suse.com/security/cve/CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159198 for CVE-2019-19770",
          "url": "https://bugzilla.suse.com/1159198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171295 for CVE-2019-19770",
          "url": "https://bugzilla.suse.com/1171295"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19770"
    },
    {
      "cve": "CVE-2019-19965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19965",
          "url": "https://www.suse.com/security/cve/CVE-2019-19965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159911 for CVE-2019-19965",
          "url": "https://bugzilla.suse.com/1159911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19965"
    },
    {
      "cve": "CVE-2019-19966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19966",
          "url": "https://www.suse.com/security/cve/CVE-2019-19966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159841 for CVE-2019-19966",
          "url": "https://bugzilla.suse.com/1159841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19966"
    },
    {
      "cve": "CVE-2019-20054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20054",
          "url": "https://www.suse.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159910 for CVE-2019-20054",
          "url": "https://bugzilla.suse.com/1159910"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20054"
    },
    {
      "cve": "CVE-2019-20095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20095",
          "url": "https://www.suse.com/security/cve/CVE-2019-20095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159909 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159914 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-20095"
    },
    {
      "cve": "CVE-2019-20096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20096",
          "url": "https://www.suse.com/security/cve/CVE-2019-20096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159908 for CVE-2019-20096",
          "url": "https://bugzilla.suse.com/1159908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20096"
    },
    {
      "cve": "CVE-2019-20810",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20810"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20810",
          "url": "https://www.suse.com/security/cve/CVE-2019-20810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172458 for CVE-2019-20810",
          "url": "https://bugzilla.suse.com/1172458"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-20810"
    },
    {
      "cve": "CVE-2019-20812",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20812"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20812",
          "url": "https://www.suse.com/security/cve/CVE-2019-20812"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172453 for CVE-2019-20812",
          "url": "https://bugzilla.suse.com/1172453"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20812"
    },
    {
      "cve": "CVE-2019-3701",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3701"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user \"root\" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller\u0027s I/O memory when processing can-gw manipulated outgoing frames.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3701",
          "url": "https://www.suse.com/security/cve/CVE-2019-3701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1120386 for CVE-2019-3701",
          "url": "https://bugzilla.suse.com/1120386"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3701"
    },
    {
      "cve": "CVE-2019-9455",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-9455"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-9455",
          "url": "https://www.suse.com/security/cve/CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170345 for CVE-2019-9455",
          "url": "https://bugzilla.suse.com/1170345"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-9455"
    },
    {
      "cve": "CVE-2019-9458",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-9458"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-9458",
          "url": "https://www.suse.com/security/cve/CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168295 for CVE-2019-9458",
          "url": "https://bugzilla.suse.com/1168295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173963 for CVE-2019-9458",
          "url": "https://bugzilla.suse.com/1173963"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-9458"
    },
    {
      "cve": "CVE-2020-0543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0543",
          "url": "https://www.suse.com/security/cve/CVE-2020-0543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1154824 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1154824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172205 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1172205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172206 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1172206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172207 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1172207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172770 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1172770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0543"
    },
    {
      "cve": "CVE-2020-10690",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10690"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10690",
          "url": "https://www.suse.com/security/cve/CVE-2020-10690"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170056 for CVE-2020-10690",
          "url": "https://bugzilla.suse.com/1170056"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10690"
    },
    {
      "cve": "CVE-2020-10711",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10711"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10711",
          "url": "https://www.suse.com/security/cve/CVE-2020-10711"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171191 for CVE-2020-10711",
          "url": "https://bugzilla.suse.com/1171191"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10711"
    },
    {
      "cve": "CVE-2020-10720",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10720"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10720",
          "url": "https://www.suse.com/security/cve/CVE-2020-10720"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170778 for CVE-2020-10720",
          "url": "https://bugzilla.suse.com/1170778"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10720"
    },
    {
      "cve": "CVE-2020-10732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10732",
          "url": "https://www.suse.com/security/cve/CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171220 for CVE-2020-10732",
          "url": "https://bugzilla.suse.com/1171220"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-10732"
    },
    {
      "cve": "CVE-2020-10751",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10751"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10751",
          "url": "https://www.suse.com/security/cve/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171189 for CVE-2020-10751",
          "url": "https://bugzilla.suse.com/1171189"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174963 for CVE-2020-10751",
          "url": "https://bugzilla.suse.com/1174963"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10751"
    },
    {
      "cve": "CVE-2020-10757",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10757"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10757",
          "url": "https://www.suse.com/security/cve/CVE-2020-10757"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-10757",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172317 for CVE-2020-10757",
          "url": "https://bugzilla.suse.com/1172317"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172437 for CVE-2020-10757",
          "url": "https://bugzilla.suse.com/1172437"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-10757"
    },
    {
      "cve": "CVE-2020-10942",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10942"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10942",
          "url": "https://www.suse.com/security/cve/CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1167629 for CVE-2020-10942",
          "url": "https://bugzilla.suse.com/1167629"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10942"
    },
    {
      "cve": "CVE-2020-11494",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11494"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11494",
          "url": "https://www.suse.com/security/cve/CVE-2020-11494"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168424 for CVE-2020-11494",
          "url": "https://bugzilla.suse.com/1168424"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-11494"
    },
    {
      "cve": "CVE-2020-11608",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11608"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11608",
          "url": "https://www.suse.com/security/cve/CVE-2020-11608"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168829 for CVE-2020-11608",
          "url": "https://bugzilla.suse.com/1168829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-11608"
    },
    {
      "cve": "CVE-2020-11609",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11609"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11609",
          "url": "https://www.suse.com/security/cve/CVE-2020-11609"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168854 for CVE-2020-11609",
          "url": "https://bugzilla.suse.com/1168854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-11609"
    },
    {
      "cve": "CVE-2020-11669",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-11669"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-11669",
          "url": "https://www.suse.com/security/cve/CVE-2020-11669"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1169390 for CVE-2020-11669",
          "url": "https://bugzilla.suse.com/1169390"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-11669"
    },
    {
      "cve": "CVE-2020-12114",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12114"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12114",
          "url": "https://www.suse.com/security/cve/CVE-2020-12114"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171098 for CVE-2020-12114",
          "url": "https://bugzilla.suse.com/1171098"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12114"
    },
    {
      "cve": "CVE-2020-12464",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12464"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12464",
          "url": "https://www.suse.com/security/cve/CVE-2020-12464"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170901 for CVE-2020-12464",
          "url": "https://bugzilla.suse.com/1170901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 1.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-12464"
    },
    {
      "cve": "CVE-2020-12652",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12652"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12652",
          "url": "https://www.suse.com/security/cve/CVE-2020-12652"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171218 for CVE-2020-12652",
          "url": "https://bugzilla.suse.com/1171218"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12652"
    },
    {
      "cve": "CVE-2020-12653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12653",
          "url": "https://www.suse.com/security/cve/CVE-2020-12653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-12653",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171195 for CVE-2020-12653",
          "url": "https://bugzilla.suse.com/1171195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171254 for CVE-2020-12653",
          "url": "https://bugzilla.suse.com/1171254"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-12653"
    },
    {
      "cve": "CVE-2020-12654",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12654"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12654",
          "url": "https://www.suse.com/security/cve/CVE-2020-12654"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-12654",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171202 for CVE-2020-12654",
          "url": "https://bugzilla.suse.com/1171202"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171252 for CVE-2020-12654",
          "url": "https://bugzilla.suse.com/1171252"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-12654"
    },
    {
      "cve": "CVE-2020-12655",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12655"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12655",
          "url": "https://www.suse.com/security/cve/CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171217 for CVE-2020-12655",
          "url": "https://bugzilla.suse.com/1171217"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-12655"
    },
    {
      "cve": "CVE-2020-12656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** DISPUTED ** gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12656",
          "url": "https://www.suse.com/security/cve/CVE-2020-12656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171219 for CVE-2020-12656",
          "url": "https://bugzilla.suse.com/1171219"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-12656"
    },
    {
      "cve": "CVE-2020-12657",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12657"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12657",
          "url": "https://www.suse.com/security/cve/CVE-2020-12657"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171205 for CVE-2020-12657",
          "url": "https://bugzilla.suse.com/1171205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201585 for CVE-2020-12657",
          "url": "https://bugzilla.suse.com/1201585"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12657"
    },
    {
      "cve": "CVE-2020-12769",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12769"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12769",
          "url": "https://www.suse.com/security/cve/CVE-2020-12769"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171983 for CVE-2020-12769",
          "url": "https://bugzilla.suse.com/1171983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-12769"
    },
    {
      "cve": "CVE-2020-13143",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-13143"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-13143",
          "url": "https://www.suse.com/security/cve/CVE-2020-13143"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171982 for CVE-2020-13143",
          "url": "https://bugzilla.suse.com/1171982"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-13143"
    },
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-7053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-7053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-7053",
          "url": "https://www.suse.com/security/cve/CVE-2020-7053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160966 for CVE-2020-7053",
          "url": "https://bugzilla.suse.com/1160966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-7053"
    },
    {
      "cve": "CVE-2020-8428",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8428"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8428",
          "url": "https://www.suse.com/security/cve/CVE-2020-8428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162109 for CVE-2020-8428",
          "url": "https://bugzilla.suse.com/1162109"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8428"
    },
    {
      "cve": "CVE-2020-8647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8647",
          "url": "https://www.suse.com/security/cve/CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162929 for CVE-2020-8647",
          "url": "https://bugzilla.suse.com/1162929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164078 for CVE-2020-8647",
          "url": "https://bugzilla.suse.com/1164078"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8647"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8649",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8649"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8649",
          "url": "https://www.suse.com/security/cve/CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162929 for CVE-2020-8649",
          "url": "https://bugzilla.suse.com/1162929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162931 for CVE-2020-8649",
          "url": "https://bugzilla.suse.com/1162931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8649"
    },
    {
      "cve": "CVE-2020-8834",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8834"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "KVM in the Linux kernel on Power8 processors has a conflicting use of HSTATE_HOST_R1 to store r1 state in kvmppc_hv_entry plus in kvmppc_{save,restore}_tm, leading to a stack corruption. Because of this, an attacker with the ability run code in kernel space of a guest VM can cause the host kernel to panic. There were two commits that, according to the reporter, introduced the vulnerability: f024ee098476 (\"KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures\") 87a11bb6a7f7 (\"KVM: PPC: Book3S HV: Work around XER[SO] bug in fake suspend mode\") The former landed in 4.8, the latter in 4.17. This was fixed without realizing the impact in 4.18 with the following three commits, though it\u0027s believed the first is the only strictly necessary commit: 6f597c6b63b6 (\"KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm()\") 7b0e827c6970 (\"KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm\") 009c872a8bc4 (\"KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file\")",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8834",
          "url": "https://www.suse.com/security/cve/CVE-2020-8834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1168276 for CVE-2020-8834",
          "url": "https://bugzilla.suse.com/1168276"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173945 for CVE-2020-8834",
          "url": "https://bugzilla.suse.com/1173945"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-8834"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    },
    {
      "cve": "CVE-2020-9383",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-9383"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
          "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-9383",
          "url": "https://www.suse.com/security/cve/CVE-2020-9383"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165111 for CVE-2020-9383",
          "url": "https://bugzilla.suse.com/1165111"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-1-1.5.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.aarch64",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.s390x",
            "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.52.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.52.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.52.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-06-18T09:17:44Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-9383"
    }
  ]
}
  CERTFR-2020-AVI-368
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Debian | N/A | Debian 8 "Jessie" avec un noyau Linux 4.x antérieur à 4.9.210-1+deb9u1~deb8u1 | ||
| Debian | N/A | Debian stretch avec un noyau Linux antérieur à 4.9.210-1+deb9u1 | ||
| Debian | N/A | Debian buster avec un noyau Linux antérieur à 4.19.118-2+deb10u1 | ||
| Debian | N/A | Debian 8 "Jessie" avec un noyau Linux antérieur à 3.16.84-1 | 
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Debian 8 \"Jessie\" avec un noyau Linux 4.x ant\u00e9rieur \u00e0 4.9.210-1+deb9u1~deb8u1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    },
    {
      "description": "Debian stretch avec un noyau Linux ant\u00e9rieur \u00e0 4.9.210-1+deb9u1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    },
    {
      "description": "Debian buster avec un noyau Linux ant\u00e9rieur \u00e0 4.19.118-2+deb10u1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    },
    {
      "description": "Debian 8 \"Jessie\" avec un noyau Linux ant\u00e9rieur \u00e0 3.16.84-1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Debian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-12653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
    },
    {
      "name": "CVE-2020-12464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12464"
    },
    {
      "name": "CVE-2020-11609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11609"
    },
    {
      "name": "CVE-2020-12114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12114"
    },
    {
      "name": "CVE-2020-10711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10711"
    },
    {
      "name": "CVE-2020-12770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
    },
    {
      "name": "CVE-2020-12652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12652"
    },
    {
      "name": "CVE-2019-5108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-5108"
    },
    {
      "name": "CVE-2019-19462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19462"
    },
    {
      "name": "CVE-2019-19319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
    },
    {
      "name": "CVE-2020-10751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
    },
    {
      "name": "CVE-2020-11494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11494"
    },
    {
      "name": "CVE-2020-10732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
    },
    {
      "name": "CVE-2020-8649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
    },
    {
      "name": "CVE-2019-20806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20806"
    },
    {
      "name": "CVE-2018-14613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14613"
    },
    {
      "name": "CVE-2020-11565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
    },
    {
      "name": "CVE-2020-11608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11608"
    },
    {
      "name": "CVE-2020-12769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12769"
    },
    {
      "name": "CVE-2020-0009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0009"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2020-8428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8428"
    },
    {
      "name": "CVE-2020-1749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
    },
    {
      "name": "CVE-2020-9383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
    },
    {
      "name": "CVE-2019-20811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
    },
    {
      "name": "CVE-2020-13143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13143"
    },
    {
      "name": "CVE-2020-10942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
    },
    {
      "name": "CVE-2020-2732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
    },
    {
      "name": "CVE-2020-10690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
    },
    {
      "name": "CVE-2019-20636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
    },
    {
      "name": "CVE-2018-14610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14610"
    },
    {
      "name": "CVE-2018-14612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14612"
    },
    {
      "name": "CVE-2020-8647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
    },
    {
      "name": "CVE-2019-3016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3016"
    },
    {
      "name": "CVE-2019-19447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
    },
    {
      "name": "CVE-2020-12768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12768"
    },
    {
      "name": "CVE-2020-11668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
    },
    {
      "name": "CVE-2020-10757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
    },
    {
      "name": "CVE-2020-0543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
    },
    {
      "name": "CVE-2018-14611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14611"
    },
    {
      "name": "CVE-2019-2182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2182"
    },
    {
      "name": "CVE-2015-8839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-8839"
    },
    {
      "name": "CVE-2019-19768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19768"
    },
    {
      "name": "CVE-2020-12654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
    },
    {
      "name": "CVE-2020-12826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
    }
  ],
  "initial_release_date": "2020-06-11T00:00:00",
  "last_revision_date": "2020-06-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-368",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-06-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Debian LTS dla-2241 du 10 juin 2020",
      "url": "https://www.debian.org/lts/security/2020/dla-2241"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Debian LTS dla-2242 du 10 juin 2020",
      "url": "https://www.debian.org/lts/security/2020/dla-2242"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-4698 du 09 juin 2020",
      "url": "https://www.debian.org/security/2020/dsa-4698"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-4699 du 09 juin 2020",
      "url": "https://www.debian.org/security/2020/dsa-4699"
    }
  ]
}
  CERTFR-2020-AVI-260
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Debuginfo 11-SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 11-SP4-LTSS",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 11-EXTRA",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-15916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
    },
    {
      "name": "CVE-2019-19966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19966"
    },
    {
      "name": "CVE-2019-19227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19227"
    },
    {
      "name": "CVE-2019-19524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
    },
    {
      "name": "CVE-2019-19073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19073"
    },
    {
      "name": "CVE-2019-19527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
    },
    {
      "name": "CVE-2019-14896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14896"
    },
    {
      "name": "CVE-2019-15213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
    },
    {
      "name": "CVE-2020-8649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
    },
    {
      "name": "CVE-2019-19532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
    },
    {
      "name": "CVE-2020-11608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11608"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2019-19523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
    },
    {
      "name": "CVE-2019-18675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18675"
    },
    {
      "name": "CVE-2020-9383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
    },
    {
      "name": "CVE-2020-10942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
    },
    {
      "name": "CVE-2019-12456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12456"
    },
    {
      "name": "CVE-2019-19537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
    },
    {
      "name": "CVE-2019-19530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
    },
    {
      "name": "CVE-2019-19066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19066"
    },
    {
      "name": "CVE-2020-8647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
    },
    {
      "name": "CVE-2019-20096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20096"
    },
    {
      "name": "CVE-2019-18660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
    },
    {
      "name": "CVE-2019-19074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19074"
    },
    {
      "name": "CVE-2019-14897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14897"
    },
    {
      "name": "CVE-2019-19965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19965"
    },
    {
      "name": "CVE-2019-19531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19531"
    },
    {
      "name": "CVE-2019-19768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19768"
    }
  ],
  "initial_release_date": "2020-05-04T00:00:00",
  "last_revision_date": "2020-05-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-260",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-05-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2020:14354-1 du 30 avril 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-202014354-1/"
    }
  ]
}
  CERTFR-2020-AVI-124
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | 
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Module for Legacy Software 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Development Tools 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Basesystem 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP4",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-19533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
    },
    {
      "name": "CVE-2019-19036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19036"
    },
    {
      "name": "CVE-2019-19966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19966"
    },
    {
      "name": "CVE-2020-8992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8992"
    },
    {
      "name": "CVE-2019-19526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19526"
    },
    {
      "name": "CVE-2019-19927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19927"
    },
    {
      "name": "CVE-2019-19527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
    },
    {
      "name": "CVE-2019-19332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
    },
    {
      "name": "CVE-2019-14896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14896"
    },
    {
      "name": "CVE-2019-19319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
    },
    {
      "name": "CVE-2019-15213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
    },
    {
      "name": "CVE-2019-19767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
    },
    {
      "name": "CVE-2019-19532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
    },
    {
      "name": "CVE-2019-19338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2019-19523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
    },
    {
      "name": "CVE-2020-8428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8428"
    },
    {
      "name": "CVE-2019-19045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19045"
    },
    {
      "name": "CVE-2019-16746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
    },
    {
      "name": "CVE-2020-2732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
    },
    {
      "name": "CVE-2019-18808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
    },
    {
      "name": "CVE-2019-19318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19318"
    },
    {
      "name": "CVE-2019-19537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
    },
    {
      "name": "CVE-2019-20054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
    },
    {
      "name": "CVE-2019-19051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19051"
    },
    {
      "name": "CVE-2019-14615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
    },
    {
      "name": "CVE-2019-19066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19066"
    },
    {
      "name": "CVE-2020-7053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
    },
    {
      "name": "CVE-2019-19054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19054"
    },
    {
      "name": "CVE-2019-16994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
    },
    {
      "name": "CVE-2019-19447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
    },
    {
      "name": "CVE-2019-20095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
    },
    {
      "name": "CVE-2019-20096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20096"
    },
    {
      "name": "CVE-2019-14897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14897"
    },
    {
      "name": "CVE-2019-19965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19965"
    },
    {
      "name": "CVE-2019-19535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19535"
    }
  ],
  "initial_release_date": "2020-03-04T00:00:00",
  "last_revision_date": "2020-03-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-124",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-03-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200558-1 du 02 mars 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200558-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200560-1 du 02 mars 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200560-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200559-1 du 02 mars 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200559-1/"
    }
  ]
}
  CERTFR-2020-AVI-356
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 16.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 19.10",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 18.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 20.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 12.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 14.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-0067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0067"
    },
    {
      "name": "CVE-2020-12464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12464"
    },
    {
      "name": "CVE-2020-12114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12114"
    },
    {
      "name": "CVE-2020-12659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12659"
    },
    {
      "name": "CVE-2019-19319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
    },
    {
      "name": "CVE-2020-10751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
    },
    {
      "name": "CVE-2020-11494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11494"
    },
    {
      "name": "CVE-2020-8649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
    },
    {
      "name": "CVE-2020-12769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12769"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2020-1749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
    },
    {
      "name": "CVE-2020-8647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
    },
    {
      "name": "CVE-2020-0543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
    },
    {
      "name": "CVE-2020-12654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
    },
    {
      "name": "CVE-2020-12826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
    }
  ],
  "initial_release_date": "2020-06-10T00:00:00",
  "last_revision_date": "2020-06-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-356",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-06-10T00:00:00.000000"
    },
    {
      "description": "Correction de la section Risques.",
      "revision_date": "2020-06-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4392-1 du 10 juin 2020",
      "url": "https://usn.ubuntu.com/4392-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4391-1 du 10 juin 2020",
      "url": "https://usn.ubuntu.com/4391-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0068-1 du 09 juin 2020",
      "url": "https://usn.ubuntu.com/lsn/0068-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4389-1 du 09 juin 2020",
      "url": "https://usn.ubuntu.com/4389-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4388-1 du 09 juin 2020",
      "url": "https://usn.ubuntu.com/4388-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4387-1 du 09 juin 2020",
      "url": "https://usn.ubuntu.com/4387-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4390-1 du 10 juin 2020",
      "url": "https://usn.ubuntu.com/4390-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4393-1 du 10 juin 2020",
      "url": "https://usn.ubuntu.com/4393-1/"
    }
  ]
}
  CERTFR-2022-AVI-916
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Contrail Networking versions antérieures à R22.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions antérieures à 3.1.1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.2R1 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO | ||
| Juniper Networks | N/A | Contrail Networking versions antérieures à 2011.L5 | ||
| Juniper Networks | N/A | Steel Belted Radius Carrier Edition versions antérieures à 8.6.0R16 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à 5.4.7 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions 5.5.x antérieures à 5.5.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions 3.2.x antérieures à 3.2.1 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Paragon Active Assurance (anciennement Netrounds) versions ant\u00e9rieures \u00e0 3.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space versions ant\u00e9rieures \u00e0 22.2R1",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Contrail Networking versions ant\u00e9rieures \u00e0 2011.L5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Steel Belted Radius Carrier Edition versions ant\u00e9rieures \u00e0 8.6.0R16",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions ant\u00e9rieures \u00e0 5.4.7",
      "product": {
        "name": "Session Smart Router",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions 5.5.x ant\u00e9rieures \u00e0 5.5.3",
      "product": {
        "name": "Session Smart Router",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Paragon Active Assurance (anciennement Netrounds) versions 3.2.x ant\u00e9rieures \u00e0 3.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-1343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
    },
    {
      "name": "CVE-2022-22243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22243"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2020-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25710"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2022-24407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
    },
    {
      "name": "CVE-2021-35586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
    },
    {
      "name": "CVE-2022-22238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22238"
    },
    {
      "name": "CVE-2022-22249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22249"
    },
    {
      "name": "CVE-2021-35550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
    },
    {
      "name": "CVE-2022-22227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22227"
    },
    {
      "name": "CVE-2016-0701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0701"
    },
    {
      "name": "CVE-2021-25220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
    },
    {
      "name": "CVE-2021-35567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
    },
    {
      "name": "CVE-2021-31535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
    },
    {
      "name": "CVE-2021-42574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
    },
    {
      "name": "CVE-2020-27777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
    },
    {
      "name": "CVE-2022-22208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22208"
    },
    {
      "name": "CVE-2022-1292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
    },
    {
      "name": "CVE-2017-5929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5929"
    },
    {
      "name": "CVE-2022-22218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22218"
    },
    {
      "name": "CVE-2021-20271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2022-22201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22201"
    },
    {
      "name": "CVE-2020-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
    },
    {
      "name": "CVE-2021-42771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
    },
    {
      "name": "CVE-2021-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
    },
    {
      "name": "CVE-2018-20532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20532"
    },
    {
      "name": "CVE-2022-22246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22246"
    },
    {
      "name": "CVE-2007-6755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
    },
    {
      "name": "CVE-2020-29661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
    },
    {
      "name": "CVE-2022-22250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22250"
    },
    {
      "name": "CVE-2022-22192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22192"
    },
    {
      "name": "CVE-2019-12735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
    },
    {
      "name": "CVE-2022-22239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22239"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2022-22241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22241"
    },
    {
      "name": "CVE-2020-25212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
    },
    {
      "name": "CVE-2019-2435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2435"
    },
    {
      "name": "CVE-2021-27363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
    },
    {
      "name": "CVE-2022-22226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22226"
    },
    {
      "name": "CVE-2015-9262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
    },
    {
      "name": "CVE-2021-4160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
    },
    {
      "name": "CVE-2020-24394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
    },
    {
      "name": "CVE-2021-35559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
    },
    {
      "name": "CVE-2021-3573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
    },
    {
      "name": "CVE-2019-19532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
    },
    {
      "name": "CVE-2020-14314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
    },
    {
      "name": "CVE-2021-27364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
    },
    {
      "name": "CVE-2021-35565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
    },
    {
      "name": "CVE-2022-22229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22229"
    },
    {
      "name": "CVE-2018-20534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20534"
    },
    {
      "name": "CVE-2016-4658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
    },
    {
      "name": "CVE-2021-35603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
    },
    {
      "name": "CVE-2021-28165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22225"
    },
    {
      "name": "CVE-2020-12364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2021-3711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
    },
    {
      "name": "CVE-2022-22245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22245"
    },
    {
      "name": "CVE-2022-25314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25314"
    },
    {
      "name": "CVE-2022-0330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
    },
    {
      "name": "CVE-2022-23990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
    },
    {
      "name": "CVE-2019-1543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
    },
    {
      "name": "CVE-2018-10689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10689"
    },
    {
      "name": "CVE-2016-2124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2124"
    },
    {
      "name": "CVE-2021-27365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2020-27170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
    },
    {
      "name": "CVE-2020-25705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
    },
    {
      "name": "CVE-2018-25032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
    },
    {
      "name": "CVE-2022-0847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
    },
    {
      "name": "CVE-2020-14385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
    },
    {
      "name": "CVE-2022-22232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22232"
    },
    {
      "name": "CVE-2019-18282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
    },
    {
      "name": "CVE-2020-12321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12321"
    },
    {
      "name": "CVE-2022-22240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22240"
    },
    {
      "name": "CVE-2021-46143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
    },
    {
      "name": "CVE-2019-20811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
    },
    {
      "name": "CVE-2020-12363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
    },
    {
      "name": "CVE-2021-43527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
    },
    {
      "name": "CVE-2022-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
    },
    {
      "name": "CVE-2021-3656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
    },
    {
      "name": "CVE-2021-35588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
    },
    {
      "name": "CVE-2022-22234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22234"
    },
    {
      "name": "CVE-2022-22242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22242"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2022-22251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22251"
    },
    {
      "name": "CVE-2008-5161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
    },
    {
      "name": "CVE-2022-22244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22244"
    },
    {
      "name": "CVE-2019-20934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
    },
    {
      "name": "CVE-2021-29650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
    },
    {
      "name": "CVE-2021-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
    },
    {
      "name": "CVE-2022-22233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22233"
    },
    {
      "name": "CVE-2021-4155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
    },
    {
      "name": "CVE-2021-45417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
    },
    {
      "name": "CVE-2020-10769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
    },
    {
      "name": "CVE-2018-20533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20533"
    },
    {
      "name": "CVE-2021-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
    },
    {
      "name": "CVE-2020-25656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
    },
    {
      "name": "CVE-2021-3752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
    },
    {
      "name": "CVE-2022-22224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22224"
    },
    {
      "name": "CVE-2021-20265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2020-25211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25211"
    },
    {
      "name": "CVE-2022-0492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-22247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22247"
    },
    {
      "name": "CVE-2020-12362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
    },
    {
      "name": "CVE-2019-0205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0205"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2022-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-35578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
    },
    {
      "name": "CVE-2020-28374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
    },
    {
      "name": "CVE-2021-0920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
    },
    {
      "name": "CVE-2022-22199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22199"
    },
    {
      "name": "CVE-2021-42550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
    },
    {
      "name": "CVE-2021-3712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
    },
    {
      "name": "CVE-2022-22236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22236"
    },
    {
      "name": "CVE-2020-7053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
    },
    {
      "name": "CVE-2022-22248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22248"
    },
    {
      "name": "CVE-2019-9518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518"
    },
    {
      "name": "CVE-2022-22220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22220"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    },
    {
      "name": "CVE-2021-35564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-22228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22228"
    },
    {
      "name": "CVE-2021-23840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
    },
    {
      "name": "CVE-2020-14351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14351"
    },
    {
      "name": "CVE-2020-25709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25709"
    },
    {
      "name": "CVE-2022-1434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
    },
    {
      "name": "CVE-2020-25643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
    },
    {
      "name": "CVE-2022-22223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22223"
    },
    {
      "name": "CVE-2020-25645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25645"
    },
    {
      "name": "CVE-2021-35556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
    },
    {
      "name": "CVE-2020-25717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
    },
    {
      "name": "CVE-2021-3765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
    },
    {
      "name": "CVE-2021-41617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
    },
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    },
    {
      "name": "CVE-2022-24903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2019-1551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
    },
    {
      "name": "CVE-2019-2684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2684"
    },
    {
      "name": "CVE-2021-0543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0543"
    },
    {
      "name": "CVE-2021-3653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
    },
    {
      "name": "CVE-2022-22231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22231"
    },
    {
      "name": "CVE-2021-35561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
    },
    {
      "name": "CVE-2022-22235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22235"
    },
    {
      "name": "CVE-2020-0427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2022-22211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22211"
    },
    {
      "name": "CVE-2020-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
    },
    {
      "name": "CVE-2022-22230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22230"
    },
    {
      "name": "CVE-2022-22237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22237"
    },
    {
      "name": "CVE-2021-37750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
    }
  ],
  "initial_release_date": "2022-10-13T00:00:00",
  "last_revision_date": "2022-10-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-916",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-10-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69906",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-MX-Series-An-FPC-crash-might-be-seen-due-to-mac-moves-within-the-same-bridge-domain-CVE-2022-22249"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69885",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-UTM-Enhanced-Content-Filtering-and-AntiVirus-are-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22231"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69888",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69886",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-Unified-Threat-Management-UTM-Enhanced-Content-Filtering-CF-is-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22232"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69899",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Multiple-vulnerabilities-in-J-Web"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69881",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-SBR-Carrier-Multiple-Vulnerabilities-resolved-in-version-8-6-0R16-64-bit-Solaris-and-Linux-editions"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69894",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-process-will-crash-when-a-malformed-incoming-RESV-message-is-processed-CVE-2022-22238"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69898",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-core-upon-receipt-of-a-specific-EVPN-route-by-a-BGP-route-reflector-in-an-EVPN-environment-CVE-2022-22199"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69895",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-The-ssh-CLI-command-always-runs-as-root-which-can-lead-to-privilege-escalation-CVE-2022-22239"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69908",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-cSRX-Series-Storing-Passwords-in-a-Recoverable-Format-and-software-permissions-issues-allows-a-local-attacker-to-elevate-privileges-CVE-2022-22251"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69874",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PPMD-goes-into-infinite-loop-upon-receipt-of-malformed-OSPF-TLV-CVE-2022-22224"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69902",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Due-to-a-race-condition-the-rpd-process-can-crash-upon-receipt-of-a-BGP-update-message-containing-flow-spec-route-CVE-2022-22220"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69879",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-crash-can-occur-due-to-memory-corruption-caused-by-flapping-BGP-sessions-CVE-2022-22208"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69890",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX2300-and-EX3400-Series-One-of-more-SFPs-might-become-unavailable-when-the-system-is-very-busy-CVE-2022-22234"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69875",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-multipath-scenario-when-one-of-the-contributing-routes-is-flapping-often-and-rapidly-rpd-may-crash-CVE-2022-22225"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69915",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-An-attacker-can-cause-a-kernel-panic-by-sending-a-malformed-TCP-packet-to-the-device-CVE-2022-22192"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69878",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Specific-IPv6-transit-traffic-gets-exceptioned-to-the-routing-engine-which-will-cause-increased-CPU-utilization-CVE-2022-22227"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69907",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-FPC-might-crash-and-reload-if-the-EVPN-MAC-entry-is-move-from-local-to-remote-CVE-2022-22250"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69891",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-A-flowd-core-will-be-observed-when-malformed-GPRS-traffic-is-processed-CVE-2022-22235"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69882",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69876",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX4300-MP-EX4600-QFX5000-Series-In-VxLAN-scenarios-specific-packets-processed-cause-a-memory-leak-leading-to-a-PFE-crash-CVE-2022-22226"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69892",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-When-specific-valid-SIP-packets-are-received-the-PFE-will-crash-CVE-2022-22236"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69889",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69887",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-SR-to-LDP-interworking-scenario-with-SRMS-when-a-specific-low-privileged-command-is-issued-on-an-ABR-rpd-will-crash-CVE-2022-22233"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69900",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX5000-Series-with-SPC3-SRX4000-Series-and-vSRX-When-PowerMode-IPsec-is-configured-the-PFE-will-crash-upon-receipt-of-a-malformed-ESP-packet-CVE-2022-22201"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69884",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-specific-OSPFv3-LSAs-CVE-2022-22230"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69901",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Upon-processing-of-a-genuine-packet-the-pkid-process-will-crash-during-CMPv2-auto-re-enrollment-CVE-2022-22218"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69905",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Incorrect-file-permissions-can-allow-low-privileged-user-to-cause-another-user-to-execute-arbitrary-commands-CVE-2022-22248"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69893",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Peers-not-configured-for-TCP-AO-can-establish-a-BGP-or-LDP-session-even-if-authentication-is-configured-locally-CVE-2022-22237"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69904",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Kernel-processing-of-unvalidated-TCP-segments-could-lead-to-a-Denial-of-Service-DoS-CVE-2022-22247"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69880",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-On-IPv6-OAM-SRv6-network-enabled-devices-an-attacker-sending-a-specific-genuine-packet-to-an-IPv6-address-configured-on-the-device-may-cause-a-RPD-memory-leak-leading-to-an-RPD-core-CVE-2022-22228"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69873",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-QFX10000-Series-In-IP-MPLS-PHP-node-scenarios-upon-receipt-of-certain-crafted-packets-multiple-interfaces-in-LAG-configurations-may-detach-CVE-2022-22223"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69896",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-memory-leak-might-be-observed-while-running-a-specific-cli-command-in-a-RIB-sharding-scenario-CVE-2022-22240"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69897",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-release-2011-L5"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69916",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-Multiple-FPCs-become-unreachable-due-to-continuous-polling-of-specific-SNMP-OID-CVE-2022-22211"
    },
    {
      "published_at": "2022-10-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69883",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Paragon-Active-Assurance-Formerly-Netrounds-Stored-Cross-site-Scripting-XSS-vulnerability-in-web-administration-CVE-2022-22229"
    }
  ]
}
  CERTFR-2020-AVI-119
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Module for Public Cloud 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-19533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
    },
    {
      "name": "CVE-2019-19036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19036"
    },
    {
      "name": "CVE-2019-19966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19966"
    },
    {
      "name": "CVE-2020-8992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8992"
    },
    {
      "name": "CVE-2019-19526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19526"
    },
    {
      "name": "CVE-2019-19927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19927"
    },
    {
      "name": "CVE-2019-19527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
    },
    {
      "name": "CVE-2019-19332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
    },
    {
      "name": "CVE-2019-14896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14896"
    },
    {
      "name": "CVE-2019-19319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
    },
    {
      "name": "CVE-2019-19767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
    },
    {
      "name": "CVE-2019-19532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
    },
    {
      "name": "CVE-2019-19338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2019-19523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
    },
    {
      "name": "CVE-2020-8428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8428"
    },
    {
      "name": "CVE-2019-19045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19045"
    },
    {
      "name": "CVE-2019-16746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
    },
    {
      "name": "CVE-2019-18808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
    },
    {
      "name": "CVE-2019-19318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19318"
    },
    {
      "name": "CVE-2019-19537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
    },
    {
      "name": "CVE-2019-20054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
    },
    {
      "name": "CVE-2019-19051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19051"
    },
    {
      "name": "CVE-2019-14615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
    },
    {
      "name": "CVE-2019-19066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19066"
    },
    {
      "name": "CVE-2020-7053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
    },
    {
      "name": "CVE-2019-19054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19054"
    },
    {
      "name": "CVE-2019-16994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
    },
    {
      "name": "CVE-2019-19447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
    },
    {
      "name": "CVE-2019-20095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
    },
    {
      "name": "CVE-2019-20096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20096"
    },
    {
      "name": "CVE-2019-14897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14897"
    },
    {
      "name": "CVE-2019-19965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19965"
    },
    {
      "name": "CVE-2019-19535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19535"
    }
  ],
  "initial_release_date": "2020-02-28T00:00:00",
  "last_revision_date": "2020-02-28T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-119",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-02-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200511-1 du 27 f\u00e9vrier 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200511-1/"
    }
  ]
}
  CERTFR-2020-AVI-181
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Module for Legacy Software 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Development Tools 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Basesystem 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-8649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2020-9383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
    },
    {
      "name": "CVE-2020-8647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
    },
    {
      "name": "CVE-2019-19768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19768"
    }
  ],
  "initial_release_date": "2020-04-01T00:00:00",
  "last_revision_date": "2020-04-01T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-181",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-04-01T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200836-1 du 31 mars 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200836-1/"
    }
  ]
}
  CERTFR-2021-AVI-665
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | 
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Workstation 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Desktop 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-27777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
    },
    {
      "name": "CVE-2021-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2021-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-29650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    }
  ],
  "initial_release_date": "2021-09-01T00:00:00",
  "last_revision_date": "2021-09-01T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-665",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-09-01T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3321 du 31 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3321"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3327 du 31 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3327"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3375 du 31 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3328"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3320 du 31 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3320"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3399 du 31 ao\u00fbt 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3399"
    }
  ]
}
  CERTFR-2021-AVI-720
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.7 x86_64 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - TUS 7.7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    }
  ],
  "initial_release_date": "2021-09-21T00:00:00",
  "last_revision_date": "2021-09-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-720",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-09-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:3522 du 14 septembre 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:3522"
    }
  ]
}
  CERTFR-2023-AVI-0051
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2016-4658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
    },
    {
      "name": "CVE-2016-8625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
    },
    {
      "name": "CVE-2016-8743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
    },
    {
      "name": "CVE-2017-12613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
    },
    {
      "name": "CVE-2019-1543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
    },
    {
      "name": "CVE-2019-1551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
    },
    {
      "name": "CVE-2020-0549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
    },
    {
      "name": "CVE-2020-0548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2020-11668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
    },
    {
      "name": "CVE-2020-0543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
    },
    {
      "name": "CVE-2020-14579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
    },
    {
      "name": "CVE-2020-14573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
    },
    {
      "name": "CVE-2020-14577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
    },
    {
      "name": "CVE-2020-14578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
    },
    {
      "name": "CVE-2020-14621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
    },
    {
      "name": "CVE-2020-14562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
    },
    {
      "name": "CVE-2020-14583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
    },
    {
      "name": "CVE-2020-14581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
    },
    {
      "name": "CVE-2020-14593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
    },
    {
      "name": "CVE-2020-14556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
    },
    {
      "name": "CVE-2020-14145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
    },
    {
      "name": "CVE-2020-14796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
    },
    {
      "name": "CVE-2020-14803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
    },
    {
      "name": "CVE-2020-14792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
    },
    {
      "name": "CVE-2020-14779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
    },
    {
      "name": "CVE-2020-14798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
    },
    {
      "name": "CVE-2020-14797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
    },
    {
      "name": "CVE-2020-14781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
    },
    {
      "name": "CVE-2020-14782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
    },
    {
      "name": "CVE-2020-14871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
    },
    {
      "name": "CVE-2020-8698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
    },
    {
      "name": "CVE-2020-8696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
    },
    {
      "name": "CVE-2020-25704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
    },
    {
      "name": "CVE-2020-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
    },
    {
      "name": "CVE-2020-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
    },
    {
      "name": "CVE-2020-1971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
    },
    {
      "name": "CVE-2020-8695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
    },
    {
      "name": "CVE-2019-20934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
    },
    {
      "name": "CVE-2021-3156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2021-23841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
    },
    {
      "name": "CVE-2021-23840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2020-12363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
    },
    {
      "name": "CVE-2020-12362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
    },
    {
      "name": "CVE-2020-12364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
    },
    {
      "name": "CVE-2021-27365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
    },
    {
      "name": "CVE-2021-27363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
    },
    {
      "name": "CVE-2021-27364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
    },
    {
      "name": "CVE-2020-27170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
    },
    {
      "name": "CVE-2021-3450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
    },
    {
      "name": "CVE-2020-35498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
    },
    {
      "name": "CVE-2021-28950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
    },
    {
      "name": "CVE-2021-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
    },
    {
      "name": "CVE-2020-36322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
    },
    {
      "name": "CVE-2021-2194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
    },
    {
      "name": "CVE-2021-2162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
    },
    {
      "name": "CVE-2021-2179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
    },
    {
      "name": "CVE-2021-2307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
    },
    {
      "name": "CVE-2021-2180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
    },
    {
      "name": "CVE-2021-2144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
    },
    {
      "name": "CVE-2021-2226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
    },
    {
      "name": "CVE-2021-2169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
    },
    {
      "name": "CVE-2021-2202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
    },
    {
      "name": "CVE-2021-2166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
    },
    {
      "name": "CVE-2021-2174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
    },
    {
      "name": "CVE-2021-2154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
    },
    {
      "name": "CVE-2020-28196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
    },
    {
      "name": "CVE-2021-2178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
    },
    {
      "name": "CVE-2021-2146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
    },
    {
      "name": "CVE-2021-2160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
    },
    {
      "name": "CVE-2021-2171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
    },
    {
      "name": "CVE-2021-2161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
    },
    {
      "name": "CVE-2021-2163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
    },
    {
      "name": "CVE-2021-29650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
    },
    {
      "name": "CVE-2021-23017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
    },
    {
      "name": "CVE-2021-25217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
    },
    {
      "name": "CVE-2021-33033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
    },
    {
      "name": "CVE-2020-24512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
    },
    {
      "name": "CVE-2020-24513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
    },
    {
      "name": "CVE-2020-24511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
    },
    {
      "name": "CVE-2021-32399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
    },
    {
      "name": "CVE-2021-33034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
    },
    {
      "name": "CVE-2021-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
    },
    {
      "name": "CVE-2021-3573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
    },
    {
      "name": "CVE-2020-36385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
    },
    {
      "name": "CVE-2020-27827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
    },
    {
      "name": "CVE-2021-22555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
    },
    {
      "name": "CVE-2021-33909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
    },
    {
      "name": "CVE-2021-2388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
    },
    {
      "name": "CVE-2021-2341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
    },
    {
      "name": "CVE-2021-2432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
    },
    {
      "name": "CVE-2021-2369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
    },
    {
      "name": "CVE-2021-2389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
    },
    {
      "name": "CVE-2021-2372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
    },
    {
      "name": "CVE-2021-2342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
    },
    {
      "name": "CVE-2021-2385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
    },
    {
      "name": "CVE-2021-2390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-37576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
    },
    {
      "name": "CVE-2021-3712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
    },
    {
      "name": "CVE-2021-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
    },
    {
      "name": "CVE-2021-39275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
    },
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    },
    {
      "name": "CVE-2021-3752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
    },
    {
      "name": "CVE-2021-27219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
    },
    {
      "name": "CVE-2020-26137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2020-26116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
    },
    {
      "name": "CVE-2021-35603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
    },
    {
      "name": "CVE-2021-35586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
    },
    {
      "name": "CVE-2021-35559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
    },
    {
      "name": "CVE-2021-35567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
    },
    {
      "name": "CVE-2021-35578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
    },
    {
      "name": "CVE-2021-35550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
    },
    {
      "name": "CVE-2021-35561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
    },
    {
      "name": "CVE-2021-35565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
    },
    {
      "name": "CVE-2021-35564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
    },
    {
      "name": "CVE-2021-35556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
    },
    {
      "name": "CVE-2021-26691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
    },
    {
      "name": "CVE-2021-0920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
    },
    {
      "name": "CVE-2021-42739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
    },
    {
      "name": "CVE-2021-44790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
    },
    {
      "name": "CVE-2021-4083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
    },
    {
      "name": "CVE-2021-4155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
    },
    {
      "name": "CVE-2022-21349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
    },
    {
      "name": "CVE-2022-21277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
    },
    {
      "name": "CVE-2022-21291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
    },
    {
      "name": "CVE-2022-21340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
    },
    {
      "name": "CVE-2022-21282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
    },
    {
      "name": "CVE-2022-21341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
    },
    {
      "name": "CVE-2022-21365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
    },
    {
      "name": "CVE-2022-21305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
    },
    {
      "name": "CVE-2022-21366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
    },
    {
      "name": "CVE-2022-21360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
    },
    {
      "name": "CVE-2022-21296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
    },
    {
      "name": "CVE-2022-21293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
    },
    {
      "name": "CVE-2022-21248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
    },
    {
      "name": "CVE-2022-21299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
    },
    {
      "name": "CVE-2022-21294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
    },
    {
      "name": "CVE-2022-21283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
    },
    {
      "name": "CVE-2021-4034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
    },
    {
      "name": "CVE-2021-4028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
    },
    {
      "name": "CVE-2022-2526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
    },
    {
      "name": "CVE-2022-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
    },
    {
      "name": "CVE-2022-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
    },
    {
      "name": "CVE-2022-21449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
    },
    {
      "name": "CVE-2022-21476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
    },
    {
      "name": "CVE-2022-21125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
    },
    {
      "name": "CVE-2022-21123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
    },
    {
      "name": "CVE-2022-21166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
    },
    {
      "name": "CVE-2022-38178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
    },
    {
      "name": "CVE-2018-25032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
    },
    {
      "name": "CVE-2022-32250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2021-46143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2022-0330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
    },
    {
      "name": "CVE-2022-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
    },
    {
      "name": "CVE-2022-0492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2022-22720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
    },
    {
      "name": "CVE-2022-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
    },
    {
      "name": "CVE-2022-21434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
    },
    {
      "name": "CVE-2022-21443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
    },
    {
      "name": "CVE-2022-21496",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
    },
    {
      "name": "CVE-2022-21426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2022-1729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
    },
    {
      "name": "CVE-2021-30465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
    },
    {
      "name": "CVE-2021-42574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
    },
    {
      "name": "CVE-2022-21541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
    },
    {
      "name": "CVE-2022-34169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
    },
    {
      "name": "CVE-2022-21549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
    },
    {
      "name": "CVE-2022-21540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
    },
    {
      "name": "CVE-2007-6755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2021-3765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
    },
    {
      "name": "CVE-2022-24903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
    },
    {
      "name": "CVE-2022-21626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
    },
    {
      "name": "CVE-2022-21619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
    },
    {
      "name": "CVE-2022-21628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
    },
    {
      "name": "CVE-2022-21624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
    },
    {
      "name": "CVE-2019-11287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
    },
    {
      "name": "CVE-2023-22397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
    },
    {
      "name": "CVE-2023-22403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
    },
    {
      "name": "CVE-2023-22398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
    },
    {
      "name": "CVE-2023-22399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
    },
    {
      "name": "CVE-2023-22417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
    },
    {
      "name": "CVE-2023-22395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
    },
    {
      "name": "CVE-2023-22391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
    },
    {
      "name": "CVE-2023-22409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
    },
    {
      "name": "CVE-2023-22407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
    },
    {
      "name": "CVE-2023-22414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
    },
    {
      "name": "CVE-2023-22393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
    },
    {
      "name": "CVE-2023-22415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
    },
    {
      "name": "CVE-2023-22405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
    },
    {
      "name": "CVE-2023-22412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
    },
    {
      "name": "CVE-2020-24489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
    },
    {
      "name": "CVE-2023-22404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
    },
    {
      "name": "CVE-2021-3504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
    },
    {
      "name": "CVE-2023-22394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
    },
    {
      "name": "CVE-2023-22406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
    },
    {
      "name": "CVE-2018-8046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
    },
    {
      "name": "CVE-2007-2285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
    },
    {
      "name": "CVE-2021-35940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
    },
    {
      "name": "CVE-2023-22411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
    },
    {
      "name": "CVE-2023-22401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
    },
    {
      "name": "CVE-2020-15778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
    },
    {
      "name": "CVE-2023-22396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
    },
    {
      "name": "CVE-2023-22402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
    },
    {
      "name": "CVE-2021-3621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
    },
    {
      "name": "CVE-2023-22400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
    },
    {
      "name": "CVE-2023-22408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
    },
    {
      "name": "CVE-2022-0934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
    },
    {
      "name": "CVE-2021-40085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
    },
    {
      "name": "CVE-2023-22410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
    },
    {
      "name": "CVE-2023-22416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
    },
    {
      "name": "CVE-2023-22413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
    }
  ],
  "initial_release_date": "2023-01-23T00:00:00",
  "last_revision_date": "2023-01-23T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0051",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-01-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
      "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
    }
  ]
}
  CERTFR-2020-AVI-331
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Android toutes versions sans le correctif de s\u00e9curit\u00e9 du 01 juin 2020",
      "product": {
        "name": "Android",
        "vendor": {
          "name": "Google",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-0197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0197"
    },
    {
      "name": "CVE-2020-0176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0176"
    },
    {
      "name": "CVE-2019-13135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13135"
    },
    {
      "name": "CVE-2020-0165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0165"
    },
    {
      "name": "CVE-2020-0120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0120"
    },
    {
      "name": "CVE-2019-19529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19529"
    },
    {
      "name": "CVE-2020-0137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0137"
    },
    {
      "name": "CVE-2020-0206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0206"
    },
    {
      "name": "CVE-2020-0216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0216"
    },
    {
      "name": "CVE-2020-0204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0204"
    },
    {
      "name": "CVE-2020-0177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0177"
    },
    {
      "name": "CVE-2020-0194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0194"
    },
    {
      "name": "CVE-2020-0095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0095"
    },
    {
      "name": "CVE-2020-3660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3660"
    },
    {
      "name": "CVE-2020-0212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0212"
    },
    {
      "name": "CVE-2020-3658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3658"
    },
    {
      "name": "CVE-2020-0153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0153"
    },
    {
      "name": "CVE-2020-0211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0211"
    },
    {
      "name": "CVE-2020-0234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0234"
    },
    {
      "name": "CVE-2020-3661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3661"
    },
    {
      "name": "CVE-2020-0199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0199"
    },
    {
      "name": "CVE-2020-0210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0210"
    },
    {
      "name": "CVE-2020-0161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0161"
    },
    {
      "name": "CVE-2017-9704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9704"
    },
    {
      "name": "CVE-2020-0168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0168"
    },
    {
      "name": "CVE-2019-10501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10501"
    },
    {
      "name": "CVE-2019-19543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
    },
    {
      "name": "CVE-2019-10626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10626"
    },
    {
      "name": "CVE-2020-0144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0144"
    },
    {
      "name": "CVE-2020-0233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0233"
    },
    {
      "name": "CVE-2020-0160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0160"
    },
    {
      "name": "CVE-2019-19526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19526"
    },
    {
      "name": "CVE-2020-0187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0187"
    },
    {
      "name": "CVE-2020-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0167"
    },
    {
      "name": "CVE-2020-0118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0118"
    },
    {
      "name": "CVE-2020-0179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0179"
    },
    {
      "name": "CVE-2020-3614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3614"
    },
    {
      "name": "CVE-2020-0145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0145"
    },
    {
      "name": "CVE-2020-0171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0171"
    },
    {
      "name": "CVE-2020-3642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3642"
    },
    {
      "name": "CVE-2020-0151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0151"
    },
    {
      "name": "CVE-2020-0185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0185"
    },
    {
      "name": "CVE-2020-0115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0115"
    },
    {
      "name": "CVE-2020-0147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0147"
    },
    {
      "name": "CVE-2020-0113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0113"
    },
    {
      "name": "CVE-2019-19071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19071"
    },
    {
      "name": "CVE-2020-0141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0141"
    },
    {
      "name": "CVE-2019-18683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18683"
    },
    {
      "name": "CVE-2020-0133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0133"
    },
    {
      "name": "CVE-2020-0140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0140"
    },
    {
      "name": "CVE-2019-19767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
    },
    {
      "name": "CVE-2020-0131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0131"
    },
    {
      "name": "CVE-2020-3662",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3662"
    },
    {
      "name": "CVE-2020-0139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0139"
    },
    {
      "name": "CVE-2020-0143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0143"
    },
    {
      "name": "CVE-2020-0136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0136"
    },
    {
      "name": "CVE-2020-0169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0169"
    },
    {
      "name": "CVE-2020-0186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0186"
    },
    {
      "name": "CVE-2020-0132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0132"
    },
    {
      "name": "CVE-2020-0149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0149"
    },
    {
      "name": "CVE-2019-2219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2219"
    },
    {
      "name": "CVE-2020-0172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0172"
    },
    {
      "name": "CVE-2020-0156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0156"
    },
    {
      "name": "CVE-2020-0158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0158"
    },
    {
      "name": "CVE-2020-3676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3676"
    },
    {
      "name": "CVE-2020-0124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0124"
    },
    {
      "name": "CVE-2020-0203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0203"
    },
    {
      "name": "CVE-2020-0142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0142"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2020-3635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3635"
    },
    {
      "name": "CVE-2020-0232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0232"
    },
    {
      "name": "CVE-2020-0116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0116"
    },
    {
      "name": "CVE-2020-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0215"
    },
    {
      "name": "CVE-2020-8428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8428"
    },
    {
      "name": "CVE-2020-0154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0154"
    },
    {
      "name": "CVE-2020-0134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0134"
    },
    {
      "name": "CVE-2020-0164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0164"
    },
    {
      "name": "CVE-2019-14080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14080"
    },
    {
      "name": "CVE-2019-17666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
    },
    {
      "name": "CVE-2020-0155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0155"
    },
    {
      "name": "CVE-2020-0217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0217"
    },
    {
      "name": "CVE-2020-0163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0163"
    },
    {
      "name": "CVE-2020-0170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0170"
    },
    {
      "name": "CVE-2020-0114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0114"
    },
    {
      "name": "CVE-2020-0235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0235"
    },
    {
      "name": "CVE-2020-0191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0191"
    },
    {
      "name": "CVE-2020-0188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0188"
    },
    {
      "name": "CVE-2019-14092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14092"
    },
    {
      "name": "CVE-2020-0127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0127"
    },
    {
      "name": "CVE-2020-0213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0213"
    },
    {
      "name": "CVE-2020-0196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0196"
    },
    {
      "name": "CVE-2020-0193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0193"
    },
    {
      "name": "CVE-2020-0126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0126"
    },
    {
      "name": "CVE-2020-0121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0121"
    },
    {
      "name": "CVE-2019-10597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10597"
    },
    {
      "name": "CVE-2019-14076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14076"
    },
    {
      "name": "CVE-2020-0181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0181"
    },
    {
      "name": "CVE-2020-0135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0135"
    },
    {
      "name": "CVE-2019-14062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14062"
    },
    {
      "name": "CVE-2020-0183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0183"
    },
    {
      "name": "CVE-2020-0117",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0117"
    },
    {
      "name": "CVE-2020-3628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3628"
    },
    {
      "name": "CVE-2020-0148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0148"
    },
    {
      "name": "CVE-2020-0166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0166"
    },
    {
      "name": "CVE-2019-14073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14073"
    },
    {
      "name": "CVE-2020-0208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0208"
    },
    {
      "name": "CVE-2020-0162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0162"
    },
    {
      "name": "CVE-2019-14047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14047"
    },
    {
      "name": "CVE-2020-0207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0207"
    },
    {
      "name": "CVE-2019-9460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9460"
    },
    {
      "name": "CVE-2020-0200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0200"
    },
    {
      "name": "CVE-2020-0190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0190"
    },
    {
      "name": "CVE-2019-14094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14094"
    },
    {
      "name": "CVE-2020-0173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0173"
    },
    {
      "name": "CVE-2020-0152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0152"
    },
    {
      "name": "CVE-2020-0138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0138"
    },
    {
      "name": "CVE-2020-0195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0195"
    },
    {
      "name": "CVE-2020-8647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
    },
    {
      "name": "CVE-2020-0128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0128"
    },
    {
      "name": "CVE-2020-0219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0219"
    },
    {
      "name": "CVE-2020-0184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0184"
    },
    {
      "name": "CVE-2020-0223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0223"
    },
    {
      "name": "CVE-2020-0180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0180"
    },
    {
      "name": "CVE-2020-0125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0125"
    },
    {
      "name": "CVE-2020-0209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0209"
    },
    {
      "name": "CVE-2020-0198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0198"
    },
    {
      "name": "CVE-2019-18786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18786"
    },
    {
      "name": "CVE-2020-0119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0119"
    },
    {
      "name": "CVE-2020-0175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0175"
    },
    {
      "name": "CVE-2020-0129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0129"
    },
    {
      "name": "CVE-2020-8597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8597"
    },
    {
      "name": "CVE-2019-16275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16275"
    },
    {
      "name": "CVE-2020-3665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3665"
    },
    {
      "name": "CVE-2020-0182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0182"
    },
    {
      "name": "CVE-2020-0205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0205"
    },
    {
      "name": "CVE-2020-3626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3626"
    },
    {
      "name": "CVE-2020-0192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0192"
    },
    {
      "name": "CVE-2019-14091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14091"
    },
    {
      "name": "CVE-2020-0150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0150"
    },
    {
      "name": "CVE-2020-0189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0189"
    },
    {
      "name": "CVE-2020-0178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0178"
    },
    {
      "name": "CVE-2020-0202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0202"
    },
    {
      "name": "CVE-2020-0157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0157"
    },
    {
      "name": "CVE-2020-0146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0146"
    },
    {
      "name": "CVE-2020-3663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3663"
    },
    {
      "name": "CVE-2020-0214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0214"
    },
    {
      "name": "CVE-2020-0174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0174"
    },
    {
      "name": "CVE-2020-0159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0159"
    },
    {
      "name": "CVE-2020-0218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0218"
    },
    {
      "name": "CVE-2019-13136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
    },
    {
      "name": "CVE-2020-0201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0201"
    }
  ],
  "initial_release_date": "2020-06-02T00:00:00",
  "last_revision_date": "2020-06-02T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-331",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-06-02T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Android du 01 juin 2020",
      "url": "https://source.android.com/security/bulletin/2020-06-01"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Pixel du 01 juin 2020",
      "url": "https://source.android.com/security/bulletin/pixel/2020-06-01"
    }
  ]
}
  CERTFR-2021-AVI-451
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | 
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Workstation 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux Server",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux Desktop 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-19532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
    },
    {
      "name": "CVE-2020-12364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2020-27170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
    },
    {
      "name": "CVE-2020-25705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
    },
    {
      "name": "CVE-2020-12363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
    },
    {
      "name": "CVE-2020-25211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25211"
    },
    {
      "name": "CVE-2020-12362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    }
  ],
  "initial_release_date": "2021-06-10T00:00:00",
  "last_revision_date": "2021-06-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-451",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-06-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:2314 du 08 juin 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:2314"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:2355 du 09 juin 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:2355"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:2293 du 08 juin 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:2293"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:2316 du 08 juin 2021",
      "url": "https://access.redhat.com/errata/RHSA-2021:2316"
    }
  ]
}
  CERTFR-2020-AVI-710
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | 
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
      "product": {
        "name": "Red Hat Enterprise Linux",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    },
    {
      "description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
      "product": {
        "name": "Red Hat CodeReady Linux Builder",
        "vendor": {
          "name": "Red Hat",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-19533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
    },
    {
      "name": "CVE-2019-18809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18809"
    },
    {
      "name": "CVE-2020-12770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
    },
    {
      "name": "CVE-2019-19524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
    },
    {
      "name": "CVE-2020-12659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12659"
    },
    {
      "name": "CVE-2020-10774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10774"
    },
    {
      "name": "CVE-2019-19543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
    },
    {
      "name": "CVE-2019-9455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9455"
    },
    {
      "name": "CVE-2019-19072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19072"
    },
    {
      "name": "CVE-2020-25661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25661"
    },
    {
      "name": "CVE-2019-19332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
    },
    {
      "name": "CVE-2019-16231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
    },
    {
      "name": "CVE-2019-19319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
    },
    {
      "name": "CVE-2020-10751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
    },
    {
      "name": "CVE-2019-19062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
    },
    {
      "name": "CVE-2019-19063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
    },
    {
      "name": "CVE-2019-19767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
    },
    {
      "name": "CVE-2020-10732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
    },
    {
      "name": "CVE-2020-8649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
    },
    {
      "name": "CVE-2020-12655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
    },
    {
      "name": "CVE-2020-11565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
    },
    {
      "name": "CVE-2019-19046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
    },
    {
      "name": "CVE-2020-24490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24490"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2019-15925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-15925"
    },
    {
      "name": "CVE-2020-25662",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25662"
    },
    {
      "name": "CVE-2020-10942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
    },
    {
      "name": "CVE-2019-9458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
    },
    {
      "name": "CVE-2020-0305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0305"
    },
    {
      "name": "CVE-2019-18808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
    },
    {
      "name": "CVE-2019-19056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19056"
    },
    {
      "name": "CVE-2019-19537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
    },
    {
      "name": "CVE-2019-20054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
    },
    {
      "name": "CVE-2019-19770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19770"
    },
    {
      "name": "CVE-2019-20636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
    },
    {
      "name": "CVE-2019-19068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19068"
    },
    {
      "name": "CVE-2020-8647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
    },
    {
      "name": "CVE-2019-16233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
    },
    {
      "name": "CVE-2019-19447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
    },
    {
      "name": "CVE-2020-11668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
    },
    {
      "name": "CVE-2020-25641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641"
    },
    {
      "name": "CVE-2019-15917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
    },
    {
      "name": "CVE-2020-14381",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14381"
    },
    {
      "name": "CVE-2020-12826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
    }
  ],
  "initial_release_date": "2020-11-04T00:00:00",
  "last_revision_date": "2020-11-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-710",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-11-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2020:4685 du 4 novembre 2020",
      "url": "https://access.redhat.com/errata/RHSA-2020:4685"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2020:4686 du 4 novembre 2020",
      "url": "https://access.redhat.com/errata/RHSA-2020:4686"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2020:4609 du 4 novembre 2020",
      "url": "https://access.redhat.com/errata/RHSA-2020:4609"
    }
  ]
}
  CERTFR-2020-AVI-252
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 16.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 19.10",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 18.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 20.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 14.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-11609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11609"
    },
    {
      "name": "CVE-2020-8992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8992"
    },
    {
      "name": "CVE-2019-16234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16234"
    },
    {
      "name": "CVE-2020-11608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11608"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2020-9383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
    },
    {
      "name": "CVE-2020-10942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
    },
    {
      "name": "CVE-2020-11884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11884"
    },
    {
      "name": "CVE-2019-19051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19051"
    },
    {
      "name": "CVE-2019-16233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
    },
    {
      "name": "CVE-2020-11668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
    },
    {
      "name": "CVE-2019-19768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19768"
    }
  ],
  "initial_release_date": "2020-04-29T00:00:00",
  "last_revision_date": "2020-04-29T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-252",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-04-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4346-1 du 29 avril 2020",
      "url": "https://usn.ubuntu.com/4346-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4345-1 du 28 avril 2020",
      "url": "https://usn.ubuntu.com/4345-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4342-1 du 28 avril 2020",
      "url": "https://usn.ubuntu.com/4342-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4343-1 du 28 avril 2020",
      "url": "https://usn.ubuntu.com/4343-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4344-1 du 28 avril 2020",
      "url": "https://usn.ubuntu.com/4344-1/"
    }
  ]
}
  CERTFR-2020-AVI-148
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 | 
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Module for Realtime 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time Extension 12-SP4",
      "product": {
        "name": "SUSE Linux Enterprise Real Time",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Real Time",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-19082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19082"
    },
    {
      "name": "CVE-2019-19533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
    },
    {
      "name": "CVE-2019-19529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19529"
    },
    {
      "name": "CVE-2019-18809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18809"
    },
    {
      "name": "CVE-2019-19036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19036"
    },
    {
      "name": "CVE-2019-19966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19966"
    },
    {
      "name": "CVE-2019-19227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19227"
    },
    {
      "name": "CVE-2019-19524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
    },
    {
      "name": "CVE-2020-8992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8992"
    },
    {
      "name": "CVE-2019-19073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19073"
    },
    {
      "name": "CVE-2019-19543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
    },
    {
      "name": "CVE-2019-19526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19526"
    },
    {
      "name": "CVE-2019-19927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19927"
    },
    {
      "name": "CVE-2019-19060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19060"
    },
    {
      "name": "CVE-2019-14901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
    },
    {
      "name": "CVE-2019-19527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
    },
    {
      "name": "CVE-2019-19332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
    },
    {
      "name": "CVE-2019-14896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14896"
    },
    {
      "name": "CVE-2019-19319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
    },
    {
      "name": "CVE-2019-19536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19536"
    },
    {
      "name": "CVE-2019-19062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
    },
    {
      "name": "CVE-2019-18683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18683"
    },
    {
      "name": "CVE-2019-15213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
    },
    {
      "name": "CVE-2019-19063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
    },
    {
      "name": "CVE-2019-19767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
    },
    {
      "name": "CVE-2019-19078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19078"
    },
    {
      "name": "CVE-2019-19532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
    },
    {
      "name": "CVE-2019-19046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
    },
    {
      "name": "CVE-2019-19338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2019-19523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
    },
    {
      "name": "CVE-2020-8428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8428"
    },
    {
      "name": "CVE-2019-19083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19083"
    },
    {
      "name": "CVE-2019-19052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19052"
    },
    {
      "name": "CVE-2019-19045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19045"
    },
    {
      "name": "CVE-2019-16746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
    },
    {
      "name": "CVE-2019-19049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19049"
    },
    {
      "name": "CVE-2019-19077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19077"
    },
    {
      "name": "CVE-2019-19067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19067"
    },
    {
      "name": "CVE-2019-19080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19080"
    },
    {
      "name": "CVE-2020-2732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
    },
    {
      "name": "CVE-2019-19057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19057"
    },
    {
      "name": "CVE-2019-18808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
    },
    {
      "name": "CVE-2019-19528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19528"
    },
    {
      "name": "CVE-2019-19056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19056"
    },
    {
      "name": "CVE-2019-19058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
    },
    {
      "name": "CVE-2019-19318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19318"
    },
    {
      "name": "CVE-2019-19525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19525"
    },
    {
      "name": "CVE-2019-19075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19075"
    },
    {
      "name": "CVE-2019-19534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
    },
    {
      "name": "CVE-2019-19537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
    },
    {
      "name": "CVE-2019-20054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
    },
    {
      "name": "CVE-2019-19051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19051"
    },
    {
      "name": "CVE-2019-19530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
    },
    {
      "name": "CVE-2019-14615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
    },
    {
      "name": "CVE-2019-19068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19068"
    },
    {
      "name": "CVE-2019-19081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19081"
    },
    {
      "name": "CVE-2019-19066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19066"
    },
    {
      "name": "CVE-2020-7053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
    },
    {
      "name": "CVE-2019-19054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19054"
    },
    {
      "name": "CVE-2019-16994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
    },
    {
      "name": "CVE-2019-19447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
    },
    {
      "name": "CVE-2019-20095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
    },
    {
      "name": "CVE-2019-19065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19065"
    },
    {
      "name": "CVE-2019-20096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20096"
    },
    {
      "name": "CVE-2019-18660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
    },
    {
      "name": "CVE-2019-19074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19074"
    },
    {
      "name": "CVE-2019-14895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
    },
    {
      "name": "CVE-2019-14897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14897"
    },
    {
      "name": "CVE-2019-19965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19965"
    },
    {
      "name": "CVE-2019-19531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19531"
    },
    {
      "name": "CVE-2019-19535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19535"
    }
  ],
  "initial_release_date": "2020-03-12T00:00:00",
  "last_revision_date": "2020-03-13T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200649-1 du 13 mars 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200667-1/"
    }
  ],
  "reference": "CERTFR-2020-AVI-148",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-03-12T00:00:00.000000"
    },
    {
      "description": "Ajout du bulletin de deux bulletins de s\u00e9curit\u00e9",
      "revision_date": "2020-03-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200649-1 du 12 mars 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200649-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200667-1 du 13 mars 2020",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200605-1 du 06 mars 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200605-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200613-1 du 09 mars 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200613-1/"
    }
  ]
}
  CERTFR-2024-AVI-0575
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Junos OS versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.4-EVO antérieures à 21.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.1-EVO antérieures à 22.1R3-S6-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.4 antérieures à 22.4R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 23.2 antérieures à 23.2R2-S1 | ||
| Juniper Networks | N/A | Session Smart Router versions 6.2 antérieures à SSR-6.2.5-r2 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.4-EVO antérieures à 22.4R3-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.2-EVO antérieures à 23.2R2-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 21.4 antérieures à 21.4R3-S7 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 21.2 antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS versions 22.1 antérieures à 22.1R3-S6 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 antérieures à 22.3R3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.3-EVO antérieures à 21.3R3-S5-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.2-EVO antérieures à 21.2R3-S7-EVO | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 20.4R3-S9 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.4-EVO antérieures à 23.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.4 antérieures à 22.4R2-S2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.2 antérieures à 22.2R3-S4 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Session Smart Router versions 6.1 antérieures à SSR-6.1.8-lts | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R3-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 20.4 antérieures à 20.4R3-S10 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 24.2-EVO antérieures à 24.2R2-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.4 antérieures à 22.4R3 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.2 antérieures à 22.2R3-S1 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.3 antérieures à 21.3R3-S5 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 21.4 antérieures à 21.4R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS versions 23.4 antérieures à 23.4R1-S2 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.2 antérieures à 22.2R3-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 23.2R1-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 21.4R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.1 antérieures à 22.1R3-S6 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.2 antérieures à 21.2R3-S6 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions antérieures à 21.2R3-S6 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.2 antérieures à 22.2R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R1-S1-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 21.4R3-S8 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 22.4R3-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.4 antérieures à 23.4R1-S1 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions antérieures à 21.2R3-S7 | ||
| Juniper Networks | N/A | Session Smart Router versions antérieures à SSR-5.6.14 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 21.2R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.1 antérieures à 22.1R3-S2 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.3 antérieures à 22.3R3-S1 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions antérieures à 21.4R3-S7-EVO | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.3-EVO antérieures à 22.3R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R1-S2 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 22.3 antérieures à 22.3R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R1-S1-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R3-S3-EVO | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos Space versions antérieures à 24.1R1 | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.3-EVO antérieures à 22.3R2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.4 antérieures à 22.4R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 20.4R3-S10-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.4 antérieures à 22.4R3-S1 | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R1-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.4-EVO antérieures à 22.4R2-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions antérieures à 21.2R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 antérieures à 22.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.2-EVO antérieures à 23.2R2-S1-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 22.1 antérieures à 22.1R3-S5 | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à before 22.1R3-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 antérieures à 22.3R2-S1 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 21.4-EVO antérieures à 21.4R3-S8-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 22.2-EVO antérieures à 22.2R3-S4-EVO | ||
| Juniper Networks | N/A | SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.1 antérieures à 22.1R3-S4 | ||
| Juniper Networks | N/A | Junos OS versions 21.3 antérieures à 21.3R3-S5 | ||
| Juniper Networks | N/A | Junos OS versions antérieures à 22.1R2-S2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.1-EVO antérieures à 22.1R3-S6-EVO | ||
| Juniper Networks | N/A | Junos OS versions 22.2 antérieures à 22.2R3-S4 | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 21.4 antérieures à 21.4R3-S7 | ||
| Juniper Networks | N/A | Junos OS Evolved on ACX7000 Series versions 23.4-EVO antérieures à 23.4R1-S2-EVO | ||
| Juniper Networks | N/A | Junos OS Evolved versions antérieures à 22.4R2-EVO | ||
| Juniper Networks | N/A | Junos OS on MX Series with SPC3 line card versions 23.2 antérieures à 23.2R2 | ||
| Juniper Networks | N/A | Junos OS versions 22.2 antérieures à 22.2R2-S1 | ||
| Juniper Networks | N/A | Junos OS versions 23.1 antérieures à 23.1R2 | ||
| Juniper Networks | N/A | Junos OS on MX Series versions 22.3 antérieures à 22.3R3-S2 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R3-S3 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.2-EVO antérieures à 22.2R3-S4-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions antérieures à 21.2R3-S8 | ||
| Juniper Networks | N/A | Junos OS versions 22.3 antérieures à 22.3R2-S2 | ||
| Juniper Networks | N/A | Junos OS on QFX5000 Series and EX4600 Series versions 21.4 antérieures à 21.4R3-S6 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 22.2-EVO antérieures à 22.2R2-S1-EVO | ||
| Juniper Networks | N/A | Junos OS on SRX4600 and SRX5000 Series versions 23.4 antérieures à 23.4R2 | ||
| Juniper Networks | N/A | Junos OS Evolved versions 23.4-EVO antérieures à 23.4R1-S2-EVO | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 22.1-EVO ant\u00e9rieures \u00e0 22.1R3-S6-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions 6.2 ant\u00e9rieures \u00e0 SSR-6.2.5-r2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 21.2 ant\u00e9rieures \u00e0 21.2R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 ant\u00e9rieures \u00e0 22.3R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 21.3-EVO ant\u00e9rieures \u00e0 21.3R3-S5-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 21.2-EVO ant\u00e9rieures \u00e0 21.2R3-S7-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 20.4R3-S9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R2-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions 6.1 ant\u00e9rieures \u00e0 SSR-6.1.8-lts",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 20.4 ant\u00e9rieures \u00e0 20.4R3-S10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.4 ant\u00e9rieures \u00e0 22.4R3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.3 ant\u00e9rieures \u00e0 21.3R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 21.4 ant\u00e9rieures \u00e0 21.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R1-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 23.2R1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S8-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.2 ant\u00e9rieures \u00e0 21.2R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions ant\u00e9rieures \u00e0 21.2R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R1-S1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 21.4R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 23.4 ant\u00e9rieures \u00e0 23.4R1-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions ant\u00e9rieures \u00e0 21.2R3-S7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Session Smart Router versions ant\u00e9rieures \u00e0 SSR-5.6.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions ant\u00e9rieures \u00e0 21.2R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions ant\u00e9rieures \u00e0 21.4R3-S7-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R1-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R1-S1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S10-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R1-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R2-S2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 before 22.1R3-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 ant\u00e9rieures \u00e0 22.3R2-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R3-S8-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 21.3 ant\u00e9rieures \u00e0 21.3R3-S5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions ant\u00e9rieures \u00e0 22.1R2-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.1-EVO ant\u00e9rieures \u00e0 22.1R3-S6-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved on ACX7000 Series versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R1-S2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series with SPC3 line card versions 23.2 ant\u00e9rieures \u00e0 23.2R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R2-S1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 23.1 ant\u00e9rieures \u00e0 23.1R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on MX Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions ant\u00e9rieures \u00e0 21.2R3-S8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R2-S2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on QFX5000 Series and EX4600 Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R2-S1-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS on SRX4600 and SRX5000 Series versions 23.4 ant\u00e9rieures \u00e0 23.4R2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R1-S2-EVO",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-39560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39560"
    },
    {
      "name": "CVE-2023-32435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32435"
    },
    {
      "name": "CVE-2021-44906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
    },
    {
      "name": "CVE-2024-20919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
    },
    {
      "name": "CVE-2024-39554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39554"
    },
    {
      "name": "CVE-2023-21843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
    },
    {
      "name": "CVE-2024-39539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39539"
    },
    {
      "name": "CVE-2021-36160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36160"
    },
    {
      "name": "CVE-2020-12401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
    },
    {
      "name": "CVE-2024-39558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39558"
    },
    {
      "name": "CVE-2022-30522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30522"
    },
    {
      "name": "CVE-2021-37701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
    },
    {
      "name": "CVE-2022-21460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
    },
    {
      "name": "CVE-2021-31535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
    },
    {
      "name": "CVE-2022-36760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36760"
    },
    {
      "name": "CVE-2021-33034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
    },
    {
      "name": "CVE-2024-20926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
    },
    {
      "name": "CVE-2024-39552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39552"
    },
    {
      "name": "CVE-2021-27290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
    },
    {
      "name": "CVE-2019-11727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
    },
    {
      "name": "CVE-2023-3390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
    },
    {
      "name": "CVE-2023-4004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
    },
    {
      "name": "CVE-2021-29469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29469"
    },
    {
      "name": "CVE-2023-2002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2002"
    },
    {
      "name": "CVE-2023-21830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2021-23440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23440"
    },
    {
      "name": "CVE-2021-32804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
    },
    {
      "name": "CVE-2020-13950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13950"
    },
    {
      "name": "CVE-2021-26691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
    },
    {
      "name": "CVE-2024-39546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39546"
    },
    {
      "name": "CVE-2024-39540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39540"
    },
    {
      "name": "CVE-2018-3737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3737"
    },
    {
      "name": "CVE-2024-39543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39543"
    },
    {
      "name": "CVE-2020-11984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11984"
    },
    {
      "name": "CVE-2022-22721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22721"
    },
    {
      "name": "CVE-2021-35624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
    },
    {
      "name": "CVE-2023-35788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
    },
    {
      "name": "CVE-2023-32067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
    },
    {
      "name": "CVE-2024-39514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39514"
    },
    {
      "name": "CVE-2022-25147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
    },
    {
      "name": "CVE-2021-35604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
    },
    {
      "name": "CVE-2021-42013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42013"
    },
    {
      "name": "CVE-2023-34059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34059"
    },
    {
      "name": "CVE-2024-39529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39529"
    },
    {
      "name": "CVE-2006-20001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-20001"
    },
    {
      "name": "CVE-2024-20921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
    },
    {
      "name": "CVE-2021-2385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
    },
    {
      "name": "CVE-2022-29167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29167"
    },
    {
      "name": "CVE-2020-7774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7774"
    },
    {
      "name": "CVE-2019-10747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10747"
    },
    {
      "name": "CVE-2023-34058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34058"
    },
    {
      "name": "CVE-2011-5094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-5094"
    },
    {
      "name": "CVE-2019-16776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
    },
    {
      "name": "CVE-2022-21589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2019-10097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10097"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2023-2828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
    },
    {
      "name": "CVE-2023-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
    },
    {
      "name": "CVE-2023-4206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
    },
    {
      "name": "CVE-2022-21304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
    },
    {
      "name": "CVE-2023-3090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
    },
    {
      "name": "CVE-2024-39536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39536"
    },
    {
      "name": "CVE-2024-39555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39555"
    },
    {
      "name": "CVE-2022-3564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
    },
    {
      "name": "CVE-2023-3611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
    },
    {
      "name": "CVE-2020-13938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13938"
    },
    {
      "name": "CVE-2016-10540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-10540"
    },
    {
      "name": "CVE-2019-10082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10082"
    },
    {
      "name": "CVE-2023-42753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
    },
    {
      "name": "CVE-2016-1000232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000232"
    },
    {
      "name": "CVE-2015-9262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
    },
    {
      "name": "CVE-2023-32360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
    },
    {
      "name": "CVE-2021-37713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
    },
    {
      "name": "CVE-2021-39275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
    },
    {
      "name": "CVE-2024-39561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39561"
    },
    {
      "name": "CVE-2022-21303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
    },
    {
      "name": "CVE-2019-17023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
    },
    {
      "name": "CVE-2016-4658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
    },
    {
      "name": "CVE-2020-35452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35452"
    },
    {
      "name": "CVE-2023-4207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
    },
    {
      "name": "CVE-2022-21617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
    },
    {
      "name": "CVE-2023-0767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
    },
    {
      "name": "CVE-2022-41741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41741"
    },
    {
      "name": "CVE-2023-22067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
    },
    {
      "name": "CVE-2021-37712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2023-30630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
    },
    {
      "name": "CVE-2022-21608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
    },
    {
      "name": "CVE-2022-2526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
    },
    {
      "name": "CVE-2023-20593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
    },
    {
      "name": "CVE-2024-39535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39535"
    },
    {
      "name": "CVE-2024-39545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39545"
    },
    {
      "name": "CVE-2024-39531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39531"
    },
    {
      "name": "CVE-2022-41742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41742"
    },
    {
      "name": "CVE-2019-16777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
    },
    {
      "name": "CVE-2021-2389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
    },
    {
      "name": "CVE-2023-21840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
    },
    {
      "name": "CVE-2019-10081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10081"
    },
    {
      "name": "CVE-2020-1934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1934"
    },
    {
      "name": "CVE-2022-30556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30556"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2022-21270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
    },
    {
      "name": "CVE-2023-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2023-21980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21980"
    },
    {
      "name": "CVE-2024-39530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39530"
    },
    {
      "name": "CVE-2024-39532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39532"
    },
    {
      "name": "CVE-2023-27522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27522"
    },
    {
      "name": "CVE-2024-39557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39557"
    },
    {
      "name": "CVE-2021-2390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
    },
    {
      "name": "CVE-2024-39550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39550"
    },
    {
      "name": "CVE-2022-28615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28615"
    },
    {
      "name": "CVE-2022-21451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
    },
    {
      "name": "CVE-2014-10064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-10064"
    },
    {
      "name": "CVE-2024-39511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39511"
    },
    {
      "name": "CVE-2022-23943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23943"
    },
    {
      "name": "CVE-2024-39548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39548"
    },
    {
      "name": "CVE-2020-11993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11993"
    },
    {
      "name": "CVE-2023-22652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22652"
    },
    {
      "name": "CVE-2024-39528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39528"
    },
    {
      "name": "CVE-2023-3341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
    },
    {
      "name": "CVE-2023-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
    },
    {
      "name": "CVE-2021-43527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
    },
    {
      "name": "CVE-2022-37434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
    },
    {
      "name": "CVE-2024-39559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39559"
    },
    {
      "name": "CVE-2014-7191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-7191"
    },
    {
      "name": "CVE-2021-2356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
    },
    {
      "name": "CVE-2020-36049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36049"
    },
    {
      "name": "CVE-2023-4208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
    },
    {
      "name": "CVE-2021-41524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41524"
    },
    {
      "name": "CVE-2022-3517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
    },
    {
      "name": "CVE-2020-12402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
    },
    {
      "name": "CVE-2019-11719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
    },
    {
      "name": "CVE-2021-34798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
    },
    {
      "name": "CVE-2024-39519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39519"
    },
    {
      "name": "CVE-2021-32803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
    },
    {
      "name": "CVE-2019-17006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
    },
    {
      "name": "CVE-2022-21595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
    },
    {
      "name": "CVE-2019-16775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
    },
    {
      "name": "CVE-2020-12403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
    },
    {
      "name": "CVE-2023-3776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
    },
    {
      "name": "CVE-2023-2700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2700"
    },
    {
      "name": "CVE-2020-7754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7754"
    },
    {
      "name": "CVE-2024-39533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39533"
    },
    {
      "name": "CVE-2021-22543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
    },
    {
      "name": "CVE-2021-33909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
    },
    {
      "name": "CVE-2021-26690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26690"
    },
    {
      "name": "CVE-2022-22719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22719"
    },
    {
      "name": "CVE-2022-40674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
    },
    {
      "name": "CVE-2022-46663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46663"
    },
    {
      "name": "CVE-2011-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1473"
    },
    {
      "name": "CVE-2024-39513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39513"
    },
    {
      "name": "CVE-2021-3803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
    },
    {
      "name": "CVE-2022-21417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
    },
    {
      "name": "CVE-2024-39518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39518"
    },
    {
      "name": "CVE-2023-37450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37450"
    },
    {
      "name": "CVE-2021-30641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-30641"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2020-7660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7660"
    },
    {
      "name": "CVE-2022-31813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31813"
    },
    {
      "name": "CVE-2023-34969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
    },
    {
      "name": "CVE-2019-9517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517"
    },
    {
      "name": "CVE-2018-20834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20834"
    },
    {
      "name": "CVE-2020-12362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
    },
    {
      "name": "CVE-2020-1927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1927"
    },
    {
      "name": "CVE-2022-21592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
    },
    {
      "name": "CVE-2021-3347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2023-25690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25690"
    },
    {
      "name": "CVE-2021-2342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
    },
    {
      "name": "CVE-2022-22720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
    },
    {
      "name": "CVE-2017-15010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
    },
    {
      "name": "CVE-2019-10092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10092"
    },
    {
      "name": "CVE-2024-39541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39541"
    },
    {
      "name": "CVE-2021-44224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44224"
    },
    {
      "name": "CVE-2024-39537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39537"
    },
    {
      "name": "CVE-2022-21444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
    },
    {
      "name": "CVE-2019-17567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17567"
    },
    {
      "name": "CVE-2018-7408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-7408"
    },
    {
      "name": "CVE-2019-20149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20149"
    },
    {
      "name": "CVE-2024-20932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
    },
    {
      "name": "CVE-2023-35001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
    },
    {
      "name": "CVE-2024-39551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39551"
    },
    {
      "name": "CVE-2023-4863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
    },
    {
      "name": "CVE-2022-29404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29404"
    },
    {
      "name": "CVE-2020-14145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
    },
    {
      "name": "CVE-2019-11756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
    },
    {
      "name": "CVE-2024-20918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
    },
    {
      "name": "CVE-2024-39565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39565"
    },
    {
      "name": "CVE-2021-31618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31618"
    },
    {
      "name": "CVE-2022-21344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
    },
    {
      "name": "CVE-2023-24329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
    },
    {
      "name": "CVE-2024-39549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39549"
    },
    {
      "name": "CVE-2022-21367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
    },
    {
      "name": "CVE-2021-33193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33193"
    },
    {
      "name": "CVE-2021-41773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41773"
    },
    {
      "name": "CVE-2020-11668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
    },
    {
      "name": "CVE-2022-26377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26377"
    },
    {
      "name": "CVE-2021-44790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
    },
    {
      "name": "CVE-2020-9490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9490"
    },
    {
      "name": "CVE-2020-28502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28502"
    },
    {
      "name": "CVE-2024-39556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39556"
    },
    {
      "name": "CVE-2022-37436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37436"
    },
    {
      "name": "CVE-2021-33033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
    },
    {
      "name": "CVE-2023-32439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32439"
    },
    {
      "name": "CVE-2020-12400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
    },
    {
      "name": "CVE-2023-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
    },
    {
      "name": "CVE-2022-28330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28330"
    },
    {
      "name": "CVE-2024-39542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39542"
    },
    {
      "name": "CVE-2022-21454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
    },
    {
      "name": "CVE-2017-1000048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000048"
    },
    {
      "name": "CVE-2022-21427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
    },
    {
      "name": "CVE-2021-40438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
    },
    {
      "name": "CVE-2024-20945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2020-6829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
    },
    {
      "name": "CVE-2021-2372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
    },
    {
      "name": "CVE-2022-21245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
    },
    {
      "name": "CVE-2020-28469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
    },
    {
      "name": "CVE-2024-20952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
    },
    {
      "name": "CVE-2019-10098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10098"
    },
    {
      "name": "CVE-2024-39538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39538"
    },
    {
      "name": "CVE-2022-28614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28614"
    }
  ],
  "initial_release_date": "2024-07-12T00:00:00",
  "last_revision_date": "2024-10-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0575",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-12T00:00:00.000000"
    },
    {
      "description": "Correction d\u0027identifiants CVE erron\u00e9s",
      "revision_date": "2024-10-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
  "vendor_advisories": [
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83001",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Inconsistent-information-in-the-TE-database-can-lead-to-an-rpd-crash-CVE-2024-39541"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82976",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-The-802-1X-Authentication-Daemon-crashes-on-running-a-specific-command-CVE-2024-39511"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83027",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83021",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX4600-SRX5000-Series-TCP-packets-with-SYN-FIN-or-SYN-RST-are-transferred-after-enabling-no-syn-check-with-Express-Path-CVE-2024-39561"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83018",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-specific-PIM-packet-causes-rpd-crash-when-PIM-is-configured-along-with-MoFRR-CVE-2024-39558"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82987",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crashes-upon-concurrent-deletion-of-a-routing-instance-and-receipt-of-an-SNMP-request-CVE-2024-39528"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82982",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX240-MX480-MX960-platforms-using-MPC10E-Memory-leak-will-be-observed-when-subscribed-to-a-specific-subscription-on-Junos-Telemetry-Interface-CVE-2024-39518"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83012",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-line-card-Port-flaps-causes-rtlogd-memory-leak-leading-to-Denial-of-Service-CVE-2024-39550"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83019",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-a-specific-TCP-packet-may-result-in-a-system-crash-vmcore-on-dual-RE-systems-with-NSR-enabled-CVE-2024-39559"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83004",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-large-RPKI-RTR-PDU-packet-can-cause-rpd-to-crash-CVE-2024-39543"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83010",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-specific-packets-in-the-aftmand-process-will-lead-to-a-memory-leak-CVE-2024-39548"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83014",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-BGP-multipath-incremental-calculation-is-resulting-in-an-rpd-crash-CVE-2024-39554"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82996",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Flaps-of-BFD-sessions-with-authentication-cause-a-ppmd-memory-leak-CVE-2024-39536"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82980",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receiving-specific-traffic-on-devices-with-EVPN-VPWS-with-IGMP-snooping-enabled-will-cause-the-rpd-to-crash-CVE-2024-39514"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83000",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-Specific-valid-TCP-traffic-can-cause-a-pfe-crash-CVE-2024-39540"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83008",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Local-low-privilege-user-can-gain-root-permissions-leading-to-privilege-escalation-CVE-2024-39546"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82991",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Protocol-specific-DDoS-configuration-affects-other-protocols-CVE-2024-39531"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83011",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Receipt-of-malformed-BGP-path-attributes-leads-to-a-memory-leak-CVE-2024-39549"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82989",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Attempting-to-access-specific-sensors-on-platforms-not-supporting-these-will-lead-to-a-chassisd-crash-CVE-2024-39530"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82997",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Ports-which-have-been-inadvertently-exposed-can-be-reached-over-the-network-CVE-2024-39537"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83023",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-EX-Series-J-Web-An-unauthenticated-network-based-attacker-can-perform-XPATH-injection-attack-against-a-device-CVE-2024-39565"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83026",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R1-release"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83013",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-and-MS-MPC-MIC-Receipt-of-specific-packets-in-H-323-ALG-causes-traffic-drop-CVE-2024-39551"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83002",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-malformed-CFM-packet-or-specific-transit-traffic-leads-to-FPC-crash-CVE-2024-39542"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83015",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-malformed-BGP-update-causes-the-session-to-reset-CVE-2024-39555"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83007",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-and-NFX350-When-VPN-tunnels-parameters-are-not-matching-the-iked-process-will-crash-CVE-2024-39545"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82995",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-When-specific-traffic-is-received-in-a-VPLS-scenario-evo-pfemand-crashes-CVE-2024-39535"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82993",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX4600-Series-Output-firewall-filter-is-not-applied-if-certain-match-criteria-are-used-CVE-2024-39533"
    },
    {
      "published_at": "2024-07-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75726",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Malformed-BGP-UPDATE-causes-RPD-crash-CVE-2024-39552"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82988",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-If-DNS-traceoptions-are-configured-in-a-DGA-or-tunnel-detection-scenario-specific-DNS-traffic-leads-to-a-PFE-crash-CVE-2024-39529"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83017",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-MAC-table-changes-cause-a-memory-leak-CVE-2024-39557"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82983",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX-7000-Series-Multicast-traffic-is-looped-in-a-multihoming-EVPN-MPLS-scenario-CVE-2024-39519"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83020",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Memory-leak-due-to-RSVP-neighbor-persistent-error-leading-to-kernel-crash-CVE-2024-39560"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82998",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-When-multicast-traffic-with-a-specific-S-G-is-received-evo-pfemand-crashes-CVE-2024-39538"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82999",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX-Series-Continuous-subscriber-logins-will-lead-to-a-memory-leak-and-eventually-an-FPC-crash-CVE-2024-39539"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83016",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Loading-a-malicious-certificate-from-the-CLI-may-result-in-a-stack-based-overflow-CVE-2024-39556"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82992",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Confidential-information-in-logs-can-be-accessed-by-another-user-CVE-2024-39532"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82978",
      "url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Execution-of-a-specific-CLI-command-will-cause-a-crash-in-the-AFT-manager-CVE-2024-39513"
    }
  ]
}
  CERTFR-2020-AVI-318
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP2 | ||
| SUSE | N/A | SUSE Enterprise Storage 5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP2 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud 7 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 | 
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP3-BCL",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 12-SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Enterprise Storage 5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP 12-SP3",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "HPE Helion Openstack 8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP2-BCL",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server for SAP 12-SP2",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE OpenStack Cloud 8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE OpenStack Cloud 7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE OpenStack Cloud Crowbar 8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 12-SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-11091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
    },
    {
      "name": "CVE-2019-19533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
    },
    {
      "name": "CVE-2020-11609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11609"
    },
    {
      "name": "CVE-2019-19966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19966"
    },
    {
      "name": "CVE-2019-19524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
    },
    {
      "name": "CVE-2020-8992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8992"
    },
    {
      "name": "CVE-2019-5108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-5108"
    },
    {
      "name": "CVE-2019-19073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19073"
    },
    {
      "name": "CVE-2019-9455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9455"
    },
    {
      "name": "CVE-2019-14901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
    },
    {
      "name": "CVE-2019-19527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
    },
    {
      "name": "CVE-2019-19332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
    },
    {
      "name": "CVE-2018-12127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
    },
    {
      "name": "CVE-2019-14896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14896"
    },
    {
      "name": "CVE-2019-19319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
    },
    {
      "name": "CVE-2019-19536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19536"
    },
    {
      "name": "CVE-2019-19062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
    },
    {
      "name": "CVE-2019-18683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18683"
    },
    {
      "name": "CVE-2019-15213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
    },
    {
      "name": "CVE-2019-19767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
    },
    {
      "name": "CVE-2020-11494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11494"
    },
    {
      "name": "CVE-2020-8649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
    },
    {
      "name": "CVE-2019-19532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
    },
    {
      "name": "CVE-2020-11608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11608"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2019-19523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
    },
    {
      "name": "CVE-2019-18675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18675"
    },
    {
      "name": "CVE-2018-12130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
    },
    {
      "name": "CVE-2019-19052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19052"
    },
    {
      "name": "CVE-2020-9383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
    },
    {
      "name": "CVE-2020-10942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
    },
    {
      "name": "CVE-2019-9458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
    },
    {
      "name": "CVE-2018-21008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-21008"
    },
    {
      "name": "CVE-2020-2732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
    },
    {
      "name": "CVE-2020-10690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
    },
    {
      "name": "CVE-2019-3701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3701"
    },
    {
      "name": "CVE-2019-19525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19525"
    },
    {
      "name": "CVE-2019-19534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
    },
    {
      "name": "CVE-2019-19537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
    },
    {
      "name": "CVE-2019-20054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
    },
    {
      "name": "CVE-2019-19530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
    },
    {
      "name": "CVE-2019-14615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
    },
    {
      "name": "CVE-2019-19066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19066"
    },
    {
      "name": "CVE-2018-12126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
    },
    {
      "name": "CVE-2020-8647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
    },
    {
      "name": "CVE-2020-10720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10720"
    },
    {
      "name": "CVE-2019-19447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
    },
    {
      "name": "CVE-2019-20096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20096"
    },
    {
      "name": "CVE-2019-18660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
    },
    {
      "name": "CVE-2019-19074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19074"
    },
    {
      "name": "CVE-2017-18255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-18255"
    },
    {
      "name": "CVE-2019-14895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
    },
    {
      "name": "CVE-2019-14897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14897"
    },
    {
      "name": "CVE-2019-19965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19965"
    },
    {
      "name": "CVE-2019-19531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19531"
    },
    {
      "name": "CVE-2019-19768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19768"
    },
    {
      "name": "CVE-2019-19535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19535"
    }
  ],
  "initial_release_date": "2020-05-25T00:00:00",
  "last_revision_date": "2020-05-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-318",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-05-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20201255-1 du 12 mai 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201255-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20201275-1 du 14 mai 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201275-1/"
    }
  ]
}
  CERTFR-2020-AVI-261
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Ubuntu 16.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 18.04 LTS",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    },
    {
      "description": "Ubuntu 14.04 ESM",
      "product": {
        "name": "Ubuntu",
        "vendor": {
          "name": "Ubuntu",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-8649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2020-8647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
    }
  ],
  "initial_release_date": "2020-05-04T00:00:00",
  "last_revision_date": "2020-05-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-261",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-05-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0066-1 du 01 mai 2020",
      "url": "https://usn.ubuntu.com/lsn/0066-1/"
    }
  ]
}
  CERTFR-2020-AVI-130
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 | 
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SUSE Linux Enterprise High Availability 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Real Time Extension 12-SP4",
      "product": {
        "name": "SUSE Linux Enterprise Real Time",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP5",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Software Development Kit 12-SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 12-SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Server 12-SP4",
      "product": {
        "name": "SUSE Linux Enterprise Server",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise High Availability 12-SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Live Patching 12-SP4",
      "product": {
        "name": "SUSE Linux Enterprise Live Patching",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    },
    {
      "description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "SUSE",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2019-19533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
    },
    {
      "name": "CVE-2019-19529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19529"
    },
    {
      "name": "CVE-2019-18809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18809"
    },
    {
      "name": "CVE-2019-19036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19036"
    },
    {
      "name": "CVE-2019-19966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19966"
    },
    {
      "name": "CVE-2019-19227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19227"
    },
    {
      "name": "CVE-2019-19524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
    },
    {
      "name": "CVE-2020-8992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8992"
    },
    {
      "name": "CVE-2019-19073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19073"
    },
    {
      "name": "CVE-2019-19543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
    },
    {
      "name": "CVE-2019-19526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19526"
    },
    {
      "name": "CVE-2019-19927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19927"
    },
    {
      "name": "CVE-2019-19060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19060"
    },
    {
      "name": "CVE-2019-14901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
    },
    {
      "name": "CVE-2019-19527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
    },
    {
      "name": "CVE-2019-19332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
    },
    {
      "name": "CVE-2019-14896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14896"
    },
    {
      "name": "CVE-2019-19319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
    },
    {
      "name": "CVE-2019-19536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19536"
    },
    {
      "name": "CVE-2019-19062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
    },
    {
      "name": "CVE-2019-18683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18683"
    },
    {
      "name": "CVE-2019-15213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
    },
    {
      "name": "CVE-2019-19063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
    },
    {
      "name": "CVE-2019-19767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
    },
    {
      "name": "CVE-2019-19532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
    },
    {
      "name": "CVE-2019-19338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
    },
    {
      "name": "CVE-2020-8648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
    },
    {
      "name": "CVE-2019-19523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
    },
    {
      "name": "CVE-2020-8428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8428"
    },
    {
      "name": "CVE-2019-19052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19052"
    },
    {
      "name": "CVE-2019-19045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19045"
    },
    {
      "name": "CVE-2019-19049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19049"
    },
    {
      "name": "CVE-2019-19077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19077"
    },
    {
      "name": "CVE-2019-19067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19067"
    },
    {
      "name": "CVE-2020-2732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
    },
    {
      "name": "CVE-2019-19057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19057"
    },
    {
      "name": "CVE-2019-18808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
    },
    {
      "name": "CVE-2019-19528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19528"
    },
    {
      "name": "CVE-2019-19056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19056"
    },
    {
      "name": "CVE-2019-19058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
    },
    {
      "name": "CVE-2019-19318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19318"
    },
    {
      "name": "CVE-2019-19525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19525"
    },
    {
      "name": "CVE-2019-19075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19075"
    },
    {
      "name": "CVE-2019-19534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
    },
    {
      "name": "CVE-2019-19537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
    },
    {
      "name": "CVE-2019-20054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
    },
    {
      "name": "CVE-2019-19051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19051"
    },
    {
      "name": "CVE-2019-19530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
    },
    {
      "name": "CVE-2019-14615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14615"
    },
    {
      "name": "CVE-2019-19068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19068"
    },
    {
      "name": "CVE-2019-19066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19066"
    },
    {
      "name": "CVE-2020-7053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
    },
    {
      "name": "CVE-2019-19054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19054"
    },
    {
      "name": "CVE-2019-16994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
    },
    {
      "name": "CVE-2019-19447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
    },
    {
      "name": "CVE-2019-20095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
    },
    {
      "name": "CVE-2019-19065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19065"
    },
    {
      "name": "CVE-2019-20096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20096"
    },
    {
      "name": "CVE-2019-18660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
    },
    {
      "name": "CVE-2019-19074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19074"
    },
    {
      "name": "CVE-2019-14895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
    },
    {
      "name": "CVE-2019-14897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14897"
    },
    {
      "name": "CVE-2019-19965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19965"
    },
    {
      "name": "CVE-2019-19531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19531"
    },
    {
      "name": "CVE-2019-19535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19535"
    }
  ],
  "initial_release_date": "2020-03-06T00:00:00",
  "last_revision_date": "2020-03-06T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-130",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-03-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200599-1 du 05 mars 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200599-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200584-1 du 04 mars 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200584-1/"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200580-1 du 04 mars 2020",
      "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200580-1/"
    }
  ]
}
  RHSA-2021:2314
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\n* kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363)\n\n* kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364)\n\n* kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel crash when call the timer function (sctp_generate_proto_unreach_event) of sctp module (BZ#1707184)\n\n* SCSI error handling process on HP P440ar controller gets stuck indefinitely in device reset operation (BZ#1830268)\n\n* netfilter: reproducible deadlock on nft_log module autoload (BZ#1858329)\n\n* netfilter: NULL pointer dereference in nf_tables_set_lookup() (BZ#1873171)\n\n* [DELL EMC 7.9 Bug]: No acpi_pad threads on top command for \"power cap policy equal to 0 watts\" (BZ#1883174)\n\n* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache. (BZ#1886003)\n\n* netxen driver performs poorly with RT kernel (BZ#1894274)\n\n* gendisk-\u003edisk_part_tbl-\u003elast_lookup retains pointer after partition deletion (BZ#1898596)\n\n* Kernel experiences panic in update_group_power() due to division error even with Bug 1701115 fix (BZ#1910763)\n\n* RHEL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path (BZ#1917839)\n\n* RHEL7.9 - mm/THP: do not access vma-\u003evm_mm after calling handle_userfault (BZ#1917840)\n\n* raid: wrong raid io account (BZ#1927106)\n\n* qla2x00_status_cont_entry() missing upstream patch that prevents unnecessary ABRT/warnings (BZ#1933784)\n\n* RHEL 7.9.z - System hang caused by workqueue stall in qla2xxx driver (BZ#1937945)\n\n* selinux: setsebool can trigger a deadlock (BZ#1939091)\n\n* [Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V (BZ#1941841)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:2314",
        "url": "https://access.redhat.com/errata/RHSA-2021:2314"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1922249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
      },
      {
        "category": "external",
        "summary": "1930246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
      },
      {
        "category": "external",
        "summary": "1930249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
      },
      {
        "category": "external",
        "summary": "1930251",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
      },
      {
        "category": "external",
        "summary": "1940627",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
      },
      {
        "category": "external",
        "summary": "1941841",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941841"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2314.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T20:00:43+00:00",
      "generator": {
        "date": "2025-10-09T20:00:43+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:2314",
      "initial_release_date": "2021-06-08T22:46:51+00:00",
      "revision_history": [
        {
          "date": "2021-06-08T22:46:51+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-06-08T22:46:51+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:00:43+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.src",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.31.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.31.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "perf-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "perf-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "perf-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "perf-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2020-12362",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Integer overflow in Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8)  print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12362"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Integer overflow in Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-12363",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. Improper input validation in some Intel(R) Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper input validation in some Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12363",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Improper input validation in some Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-12364",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930251"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930251",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12364",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-27170",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2021-03-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1940627"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernels eBPF verification code. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN.   A local user with the ability to insert eBPF instructions can use the eBPF verifier to abuse a spectre like flaw where they can infer all system memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Speculation on pointer arithmetic against bpf_context pointer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-27170"
        },
        {
          "category": "external",
          "summary": "RHBZ#1940627",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27170",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170"
        }
      ],
      "release_date": "2021-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.   This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Speculation on pointer arithmetic against bpf_context pointer"
    },
    {
      "cve": "CVE-2021-3347",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-01-29T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1922249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Use after free via PI futex state",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "RHBZ#1922249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
        }
      ],
      "release_date": "2021-01-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Use after free via PI futex state"
    }
  ]
}
  rhsa-2021:2316
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\n* kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363)\n\n* kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364)\n\n* kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* lru-add-drain workqueue on RT is allocated without being used (BZ#1894587)\n\n* kernel-rt: update to the latest RHEL7.9.z source tree (BZ#1953118)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:2316",
        "url": "https://access.redhat.com/errata/RHSA-2021:2316"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1894587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894587"
      },
      {
        "category": "external",
        "summary": "1922249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
      },
      {
        "category": "external",
        "summary": "1930246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
      },
      {
        "category": "external",
        "summary": "1930249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
      },
      {
        "category": "external",
        "summary": "1930251",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
      },
      {
        "category": "external",
        "summary": "1940627",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2316.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T20:00:43+00:00",
      "generator": {
        "date": "2025-10-09T20:00:43+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:2316",
      "initial_release_date": "2021-06-08T22:44:01+00:00",
      "revision_history": [
        {
          "date": "2021-06-08T22:44:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-06-08T22:44:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:00:43+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
                  "product_id": "7Server-NFV-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time (v. 7)",
                  "product_id": "7Server-RT-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt:7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
                  "product_id": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.31.1.rt56.1169.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
                  "product_id": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.31.1.rt56.1169.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2020-12362",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Integer overflow in Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8)  print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12362"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Integer overflow in Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-12363",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. Improper input validation in some Intel(R) Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper input validation in some Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12363",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Improper input validation in some Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-12364",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930251"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930251",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12364",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-27170",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2021-03-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1940627"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernels eBPF verification code. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN.   A local user with the ability to insert eBPF instructions can use the eBPF verifier to abuse a spectre like flaw where they can infer all system memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Speculation on pointer arithmetic against bpf_context pointer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-27170"
        },
        {
          "category": "external",
          "summary": "RHBZ#1940627",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27170",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170"
        }
      ],
      "release_date": "2021-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.   This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Speculation on pointer arithmetic against bpf_context pointer"
    },
    {
      "cve": "CVE-2021-3347",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-01-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1922249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Use after free via PI futex state",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "RHBZ#1922249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
        }
      ],
      "release_date": "2021-01-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Use after free via PI futex state"
    }
  ]
}
  rhsa-2021_3522
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1972707)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975158)\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1984118)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3522",
        "url": "https://access.redhat.com/errata/RHSA-2021:3522"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1922249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3522.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-15T11:56:04+00:00",
      "generator": {
        "date": "2024-11-15T11:56:04+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3522",
      "initial_release_date": "2021-09-14T08:53:04+00:00",
      "revision_history": [
        {
          "date": "2021-09-14T08:53:04+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-09-14T08:53:04+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:56:04+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                  "product_id": "7Server-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                  "product_id": "7Server-optional-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                  "product_id": "7Server-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.56.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-1062.56.1.el7.src",
                  "product_id": "kernel-0:3.10.0-1062.56.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.56.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.56.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-14T08:53:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3522"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2021-3347",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-01-29T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1922249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Use after free via PI futex state",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "RHBZ#1922249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
        }
      ],
      "release_date": "2021-01-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-14T08:53:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3522"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Use after free via PI futex state"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-14T08:53:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3522"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-14T08:53:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3522"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  rhsa-2021:3522
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1972707)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975158)\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1984118)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3522",
        "url": "https://access.redhat.com/errata/RHSA-2021:3522"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1922249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3522.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:12+00:00",
      "generator": {
        "date": "2025-10-10T19:53:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3522",
      "initial_release_date": "2021-09-14T08:53:04+00:00",
      "revision_history": [
        {
          "date": "2021-09-14T08:53:04+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-09-14T08:53:04+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                  "product_id": "7Server-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                  "product_id": "7Server-optional-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                  "product_id": "7Server-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.56.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-1062.56.1.el7.src",
                  "product_id": "kernel-0:3.10.0-1062.56.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.56.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.56.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-14T08:53:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3522"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2021-3347",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-01-29T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1922249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Use after free via PI futex state",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "RHBZ#1922249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
        }
      ],
      "release_date": "2021-01-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-14T08:53:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3522"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Use after free via PI futex state"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-14T08:53:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3522"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-14T08:53:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3522"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  RHSA-2021:3522
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1972707)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975158)\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1984118)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3522",
        "url": "https://access.redhat.com/errata/RHSA-2021:3522"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1922249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "external",
        "summary": "1980101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3522.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T19:53:12+00:00",
      "generator": {
        "date": "2025-10-10T19:53:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3522",
      "initial_release_date": "2021-09-14T08:53:04+00:00",
      "revision_history": [
        {
          "date": "2021-09-14T08:53:04+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-09-14T08:53:04+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T19:53:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
                  "product_id": "7Server-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
                  "product_id": "7Server-optional-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
                  "product_id": "7Server-7.7.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
                  "product_id": "7Server-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
                  "product_id": "7Server-optional-7.7.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.56.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-1062.56.1.el7.src",
                  "product_id": "kernel-0:3.10.0-1062.56.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.56.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.56.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
          "product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
          "product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
          "product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
          "product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
          "product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.7.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-14T08:53:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3522"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2021-3347",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-01-29T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1922249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Use after free via PI futex state",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "RHBZ#1922249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
        }
      ],
      "release_date": "2021-01-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-14T08:53:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3522"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Use after free via PI futex state"
    },
    {
      "cve": "CVE-2021-22555",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2021-07-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1980101"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "RHBZ#1980101",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2021-07-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-14T08:53:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3522"
        },
        {
          "category": "workaround",
          "details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2025-10-06T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
          "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
          "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
          "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
          "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-09-14T08:53:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3522"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
            "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
            "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
            "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
            "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  RHSA-2020:4609
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)\n\n* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)\n\n* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)\n\n* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)\n\n* kernel: Denial Of Service in the __ipmi_bmc_register()  (CVE-2019-19046)\n\n* kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c (CVE-2019-19319)\n\n* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)\n\n* kernel: use-after-free in ext4_put_super (CVE-2019-19447)\n\n* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)\n\n* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)\n\n* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)\n\n* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)\n\n* kernel: use-after-free in debugfs_remove (CVE-2019-19770)\n\n* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)\n\n* kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c (CVE-2020-0305)\n\n* kernel: out-of-bounds read in in vc_do_resize (CVE-2020-8647)\n\n* kernel: use-after-free in n_tty_receive_buf_common (CVE-2020-8648)\n\n* kernel: invalid read location in vgacon_invert_region (CVE-2020-8649)\n\n* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)\n\n* kernel: SELinux netlink permission check bypass (CVE-2020-10751)\n\n* kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c (CVE-2020-11565)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: out-of-bounds write in xdp_umem_reg (CVE-2020-12659)\n\n* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)\n\n* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)\n\n* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\n* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)\n\n* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)\n\n* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)\n\n* kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c (CVE-2019-18809)\n\n* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() (CVE-2019-19056)\n\n* kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS (CVE-2019-19062)\n\n* kernel: Two memory leaks in the rtl_usb_probe() (CVE-2019-19063)\n\n* kernel: A memory leak in the rtl8xxxu_submit_int_urb() (CVE-2019-19068)\n\n* kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS (CVE-2019-19072)\n\n* kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)\n\n* kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c (CVE-2019-20054)\n\n* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)\n\n* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)\n\n* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:4609",
        "url": "https://access.redhat.com/errata/RHSA-2020:4609"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index"
      },
      {
        "category": "external",
        "summary": "1733495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733495"
      },
      {
        "category": "external",
        "summary": "1759052",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052"
      },
      {
        "category": "external",
        "summary": "1760100",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100"
      },
      {
        "category": "external",
        "summary": "1760310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310"
      },
      {
        "category": "external",
        "summary": "1760420",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420"
      },
      {
        "category": "external",
        "summary": "1774946",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946"
      },
      {
        "category": "external",
        "summary": "1774963",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963"
      },
      {
        "category": "external",
        "summary": "1774988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988"
      },
      {
        "category": "external",
        "summary": "1775015",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015"
      },
      {
        "category": "external",
        "summary": "1775021",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021"
      },
      {
        "category": "external",
        "summary": "1775097",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097"
      },
      {
        "category": "external",
        "summary": "1777418",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418"
      },
      {
        "category": "external",
        "summary": "1777449",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449"
      },
      {
        "category": "external",
        "summary": "1779046",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779046"
      },
      {
        "category": "external",
        "summary": "1779594",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594"
      },
      {
        "category": "external",
        "summary": "1781679",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679"
      },
      {
        "category": "external",
        "summary": "1781810",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810"
      },
      {
        "category": "external",
        "summary": "1783459",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459"
      },
      {
        "category": "external",
        "summary": "1783534",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534"
      },
      {
        "category": "external",
        "summary": "1783561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561"
      },
      {
        "category": "external",
        "summary": "1784130",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130"
      },
      {
        "category": "external",
        "summary": "1786160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160"
      },
      {
        "category": "external",
        "summary": "1786179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179"
      },
      {
        "category": "external",
        "summary": "1790063",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063"
      },
      {
        "category": "external",
        "summary": "1802555",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1802563",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563"
      },
      {
        "category": "external",
        "summary": "1817718",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718"
      },
      {
        "category": "external",
        "summary": "1819377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377"
      },
      {
        "category": "external",
        "summary": "1819399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399"
      },
      {
        "category": "external",
        "summary": "1822077",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077"
      },
      {
        "category": "external",
        "summary": "1824059",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059"
      },
      {
        "category": "external",
        "summary": "1824792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
      },
      {
        "category": "external",
        "summary": "1824918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918"
      },
      {
        "category": "external",
        "summary": "1831399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399"
      },
      {
        "category": "external",
        "summary": "1832543",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543"
      },
      {
        "category": "external",
        "summary": "1832876",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876"
      },
      {
        "category": "external",
        "summary": "1833196",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833196"
      },
      {
        "category": "external",
        "summary": "1834845",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845"
      },
      {
        "category": "external",
        "summary": "1839634",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634"
      },
      {
        "category": "external",
        "summary": "1843410",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843410"
      },
      {
        "category": "external",
        "summary": "1846964",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964"
      },
      {
        "category": "external",
        "summary": "1852298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852298"
      },
      {
        "category": "external",
        "summary": "1859590",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859590"
      },
      {
        "category": "external",
        "summary": "1860065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065"
      },
      {
        "category": "external",
        "summary": "1874311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311"
      },
      {
        "category": "external",
        "summary": "1881424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4609.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T02:11:38+00:00",
      "generator": {
        "date": "2025-10-10T02:11:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2020:4609",
      "initial_release_date": "2020-11-04T01:14:17+00:00",
      "revision_history": [
        {
          "date": "2020-11-04T01:14:17+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-11-04T01:14:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T02:11:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                  "product_id": "NFV-8.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                  "product_id": "RT-8.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
                "product": {
                  "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
                  "product_id": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-240.rt7.54.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-9455",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-09-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1819399"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s video driver. A kernel pointer lead, due to a WARN_ON statement could lead to a local information disclosure with system execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is marked as having Low impact because the information leak is very subtle and can be only used to break KASLR and not provide access to kernel memory content.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "RHBZ#1819399",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9455",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455"
        }
      ],
      "release_date": "2019-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure"
    },
    {
      "cve": "CVE-2019-9458",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-09-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1819377"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s video driver. A race condition, leading to a use-after-free, could lead to a local privilege escalation. User interaction is not needed for exploitation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use after free due to race condition in the video driver leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact, because of the need of additional privileges (usually local console user) to access the video device driver.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "RHBZ#1819377",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458"
        }
      ],
      "release_date": "2019-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent modules v4l2-common, v4l2-dv-timings from being loaded if not being used for primary display. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use after free due to race condition in the video driver leads to local privilege escalation"
    },
    {
      "cve": "CVE-2019-15917",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-10-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760100"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of the HCI UART driver. A local attacker with access permissions to the Bluetooth device can issue an ioctl, which triggers the hci_uart_set_proto() function in drivers/bluetooth/hci_ldisc.c. The flaw in this function can cause memory corruption or a denial of service because of a use-after-free issue when the hci_uart_register_dev() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a Moderate as it requires the local attacker to have permissions to issue ioctl commands to the bluetooth device and bluetooth hardware to be present.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15917"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760100",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15917",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module hci_uart from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c"
    },
    {
      "cve": "CVE-2019-15925",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-09-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1759052"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds access flaw was found in the hclge_shaper_para_calc driver in the Linux kernel. Access to an array with an index higher than its maximum index will lead to an out-of-bounds access vulnerability. This could affect both data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15925"
        },
        {
          "category": "external",
          "summary": "RHBZ#1759052",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15925",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15925"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Blacklisting the affected HCLGE driver module until a patch is available can be done using the blacklist mechanism. This will ensure the driver is not loaded at boot time.  For instructions on how to black list a kernel module, please read: https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg"
    },
    {
      "cve": "CVE-2019-16231",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the FUJITSU Extended Socket Network driver. A call to the alloc_workqueue return was not validated and causes a denial of service at the time of failure. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16231",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2019/9/9/487",
          "url": "https://lkml.org/lkml/2019/9/9/487"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20191004-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20191004-0001/"
        }
      ],
      "release_date": "2019-09-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c"
    },
    {
      "cve": "CVE-2019-16233",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760420"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the QLOGIC drivers for HBA. A call to alloc_workqueue return was not validated and can cause a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760420",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16233",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2019/9/9/487",
          "url": "https://lkml.org/lkml/2019/9/9/487"
        }
      ],
      "release_date": "2019-09-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c"
    },
    {
      "cve": "CVE-2019-18808",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1777418"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the AMD Cryptographic Co-processor driver in the Linux kernel. An attacker, able to send invalid SHA type commands, could cause the system to crash. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because it affects only specific hardware enabled systems.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "RHBZ#1777418",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18808",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808"
        }
      ],
      "release_date": "2019-11-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module ccp. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c"
    },
    {
      "cve": "CVE-2019-18809",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-10-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1777449"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Afatech 9005 DVB-T receiver driver in the Linux kernel. An attacker, with physical access to the system, could cause the system to crash following a resource cleanup. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-18809"
        },
        {
          "category": "external",
          "summary": "RHBZ#1777449",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18809",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-18809"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809"
        }
      ],
      "release_date": "2019-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module dvb-usb-af9005. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c"
    },
    {
      "cve": "CVE-2019-19046",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak problem was found in __ipmi_bmc_register in drivers/char/ipmi/ipmi_msghandler.c in Intelligent Platform Management Interface (IPMI) which is used for incoming and outgoing message routing purpose. This flaw may allow an attacker with minimal privilege to cause a denial of service by triggering ida_simple_get() failure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19046"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19046",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046"
        }
      ],
      "release_date": "2019-11-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c"
    },
    {
      "cve": "CVE-2019-19056",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775097"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the mwifiex PCIE driver in the Linux kernel handled resource cleanup on a DMA mapping error. This flaw allows an attacker able to trigger the DMA mapping error to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (DMA mapping error).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19056"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775097",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19056",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19056"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056"
        }
      ],
      "release_date": "2019-10-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex_pcie. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS"
    },
    {
      "cve": "CVE-2019-19062",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775021"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The crypto_report function mishandles resource cleanup on error. A local attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error cleanup code path.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775021",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19062",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module crypto_user. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS"
    },
    {
      "cve": "CVE-2019-19063",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775015"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The rtl_usb_probe function mishandles resource cleanup on error. An attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19063"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775015",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19063",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8192cu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS"
    },
    {
      "cve": "CVE-2019-19068",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774963"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A memory leak in the realtek driver allows an attacker to cause a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (physical access and/or system-wide out-of-memory condition).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19068"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774963",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19068",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19068"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8xxxu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS"
    },
    {
      "cve": "CVE-2019-19072",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774946"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the predicate_parse function in the tracing subsystem of the Linux kernel handled resource cleanup on error. This flaw allows an attacker with the ability to produce the error to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (high privileges).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19072"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774946",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19072",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19072"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS"
    },
    {
      "cve": "CVE-2019-19319",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1784130"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s Ext4 FileSystem in the way it uses a crafted ext4 image. This flaw allows a local user with physical access to crash the system or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (physical access or user interaction to mount the crafted filesystem image).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "RHBZ#1784130",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19319",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319"
        }
      ],
      "release_date": "2019-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c"
    },
    {
      "cve": "CVE-2019-19332",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-12-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1779594"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory write issue was found in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "RHBZ#1779594",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19332",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/",
          "url": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2019/12/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2019/12/16/1"
        }
      ],
      "release_date": "2019-12-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid"
    },
    {
      "cve": "CVE-2019-19447",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781679"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s ext4_unlink function. An attacker could corrupt memory or escalate privileges when deleting a file from a recently unmounted specially crafted ext4 filesystem, including local, USB, and iSCSI.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781679",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19447",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=205433",
          "url": "https://bugzilla.kernel.org/show_bug.cgi?id=205433"
        },
        {
          "category": "external",
          "summary": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447",
          "url": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447"
        }
      ],
      "release_date": "2019-12-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Ext4 filesytems are built into the kernel so it is not possible to prevent the kernel module from loading.  However, this flaw can be prevented by disallowing mounting of untrusted filesystems.\n\nAs mounting is a privileged operation, (except for device hotplug) removing the ability for mounting and unmounting will prevent this flaw from being exploited.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c"
    },
    {
      "cve": "CVE-2019-19524",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783459"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s input device driver functionality when unplugging a device. A user with physical access could use this flaw to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783459",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19524",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524"
        }
      ],
      "release_date": "2019-11-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue for the Red Hat Enterprise Linux 7 or higher version, prevent module ff-memless from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free"
    },
    {
      "cve": "CVE-2019-19533",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783534"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An information leak flaw was found in the Linux kernel\u0027s USB digital video device driver. An attacker with a malicious USB device presenting itself as a \u0027Technotrend/Hauppauge USB DEC\u0027 device is able to issue commands to this specific device and leak kernel internal memory information.  The highest threat from this vulnerability is a breach of data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783534",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19533",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533"
        }
      ],
      "release_date": "2019-08-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "As the ttusb_dec module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install ttusb_dec /bin/true\" \u003e\u003e /etc/modprobe.d/disable-cifs.conf \n \nThe system will need to be restarted if the ttusb_dec module is already loaded. In most circumstances, the CIFS kernel module will be unable to be unloaded while the device is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c"
    },
    {
      "cve": "CVE-2019-19537",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2019-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783561"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel, where there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer. An attacker who can hotplug at least two devices of this class can cause a use-after-free situation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition caused by a malicious USB device in the USB character device driver layer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783561",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537"
        }
      ],
      "release_date": "2019-08-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Many Character devices can trigger this flaw as they leverage the lower levels of the USB subsystem.\n\nThe safest method that I have found would be to disable USB ports that are able to be attacked\nusing this method, disable them first by disallowing them from waking up from low-power states \nwith the command (Replace X with the port number available).\n\necho disabled \u003e\u003e /sys/bus/usb/devices/usbX/power/wakeup \n\nThe system must also disable the specific ports power after with the command:\n\necho suspend | sudo tee /sys/bus/usb/devices/usbX/power/level\n\nThis change not persist through system reboots and must be applied at each reboot to be effective.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition caused by a malicious USB device in the USB character device driver layer"
    },
    {
      "cve": "CVE-2019-19543",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781810"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s infrared serial module. An attacker could use this flaw to corrupt memory and possibly escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781810",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543"
        }
      ],
      "release_date": "2019-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "As the  module will be auto-loaded when the relevant hardware is required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install serial_ir  /bin/true\" \u003e\u003e /etc/modprobe.d/disable-serial-ir.conf \n \nThe system will need to be restarted if the CIFS modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c"
    },
    {
      "cve": "CVE-2019-19767",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1786160"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s ext4 file system functionality when the user mount ext4 partition, with the usage of an additional debug parameter is defining an extra inode size. If this parameter has a non zero value, this flaw allows a local user to crash the system when inode expansion happens.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "RHBZ#1786160",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19767",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767"
        }
      ],
      "release_date": "2019-11-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "The mitigation is not to use debug_want_extra_isize parameter when mounting ext4 FS.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c"
    },
    {
      "cve": "CVE-2019-19770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1786179"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the debugfs_remove function in the Linux kernel. The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal. This vulnerability can lead to a kernel information leak. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "RHBZ#1786179",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770"
        }
      ],
      "release_date": "2019-11-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c"
    },
    {
      "cve": "CVE-2019-20054",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2019-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1790063"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of dropping sysctl entries. A local attacker who has access to load modules on the system can trigger a condition during module load failure and panic the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "RHBZ#1790063",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20054",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054"
        }
      ],
      "release_date": "2019-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c"
    },
    {
      "cve": "CVE-2019-20636",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-04-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824059"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel. A crafted keycode table could be used by drivers/input/input.c to perform the out-of-bounds write. A local user with root access can insert garbage to this keycode table that can lead to out-of-bounds memory access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write via crafted keycode table",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue was rated as having Moderate impact because of the need of physical access or administrator privileges to trigger it.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20636"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824059",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20636",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636"
        }
      ],
      "release_date": "2020-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write via crafted keycode table"
    },
    {
      "cve": "CVE-2020-0305",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-07-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1860065"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way the Linux kernel\u0027s filesystem subsystem handled a race condition in the chrdev_open function. This flaw allows a privileged local user to starve the resources, causing a denial of service or potentially escalating their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (elevated/root privileges).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "RHBZ#1860065",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0305",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079"
        }
      ],
      "release_date": "2020-07-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c"
    },
    {
      "cve": "CVE-2020-8647",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802563"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s virtual console resize functionality. An attacker with local access to virtual consoles can use the virtual console resizing code to gather kernel internal data structures.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having Moderate impact because the information leak is limited.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802563",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8647",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "The attack vector can be significantly reduced by preventing users from being able to log into the local virtual console.\n\nSee the instructions on disabling local login here: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/managing_smart_cards/pam_configuration_files , See the section on \"pam_console\" to deny users logging into the console.  This mechanism should work from el6 forward to current versions of Red Hat Enterprise Linux.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c"
    },
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2020-8649",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802555"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console. An out-of-bounds read can occur, leaking information to the console.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a having Moderate impact, it is an infoleak that is written to the screen.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802555",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8649",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c"
    },
    {
      "cve": "CVE-2020-10732",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "discovery_date": "2020-05-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1831399"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: uninitialized kernel data leak in userspace coredumps",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "RHBZ#1831399",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10732",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732"
        }
      ],
      "release_date": "2020-05-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Possible mitigation would be to disable core dumps system-wide by setting:\n\n* hard core 0\n\nIn the  /etc/security/limits.conf file and restarting applications/services/processes which users may have access to or simply reboot the system.  This disables core dumps which may not be a suitable workaround in your environment.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: uninitialized kernel data leak in userspace coredumps"
    },
    {
      "cve": "CVE-2020-10751",
      "cwe": {
        "id": "CWE-349",
        "name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
      },
      "discovery_date": "2020-05-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1839634"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SELinux netlink permission check bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "RHBZ#1839634",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10751",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/",
          "url": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2020/04/30/5",
          "url": "https://www.openwall.com/lists/oss-security/2020/04/30/5"
        }
      ],
      "release_date": "2020-04-27T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SELinux netlink permission check bypass"
    },
    {
      "cve": "CVE-2020-10774",
      "cwe": {
        "id": "CWE-909",
        "name": "Missing Initialization of Resource"
      },
      "discovery_date": "2020-06-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1846964"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw memory disclosure flaw was found in the Linux kernel\u2019s sysctl subsystem in reading the /proc/sys/kernel/rh_features file. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the limited and random (non-controllable by attacker) memory disclosure.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10774"
        },
        {
          "category": "external",
          "summary": "RHBZ#1846964",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10774",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10774"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774"
        }
      ],
      "release_date": "2020-06-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features"
    },
    {
      "cve": "CVE-2020-10942",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2020-03-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1817718"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow issue was found in the get_raw_socket() routine of the Host kernel accelerator for virtio net (vhost-net) driver. It could occur while doing an ictol(VHOST_NET_SET_BACKEND) call, and retrieving socket name in a kernel stack variable via get_raw_socket(). A user able to perform ioctl(2) calls on the \u0027/dev/vhost-net\u0027 device may use this flaw to crash the kernel resulting in DoS issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the kernel package as shipped with the Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\nThis issue affects the kernel package as shipped with the Red Hat Enterprise Linux 6, 7 and 8. Future kernel updates for Red Hat Enterprise Linux 6, 7 and 8 may address this issue.\n\nIt is rated to have Low impact because it is quite difficult/unlikely to be triggered by a guest (or even host) user. In case it does happen, like in the upstream report, the stack overflow shall hit the stack canaries, resulting in DoS by crashing the kernel.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "RHBZ#1817718",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10942",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942"
        }
      ],
      "release_date": "2020-03-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field"
    },
    {
      "cve": "CVE-2020-11565",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-04-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824918"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel. An empty nodelist in mempolicy.c is mishandled durig mount option parsing leading to a stack-based out-of-bounds write. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-11565"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824918",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11565",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565"
        }
      ],
      "release_date": "2020-04-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c"
    },
    {
      "cve": "CVE-2020-11668",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2020-04-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824792"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824792",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668"
        }
      ],
      "release_date": "2020-01-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c"
    },
    {
      "cve": "CVE-2020-12655",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2020-05-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1832543"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger it (administrative account or physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "RHBZ#1832543",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12655",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655"
        }
      ],
      "release_date": "2020-03-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "This flaw requires an attacker being able to have the system mount a crafted filesystem.\n\nIf the xfs filesystem is not in use, the \u0027xfs\u0027 kernel module can be blacklisted and the module\nwill not be loaded when the filesystem is mounted, mounting will fail.\n\nHowever, if this filesystem is in use, this workaround will not be suitable.\n\nTo find out how to blacklist the \"xfs\" kernel module please see https://access.redhat.com/solutions/41278 or contact Red hat Global Support services",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata"
    },
    {
      "cve": "CVE-2020-12659",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-05-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1832876"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds (OOB) memory access flaw was found in the Network XDP (the eXpress Data Path) module in the Linux kernel\u0027s xdp_umem_reg function in net/xdp/xdp_umem.c. When a user with special user privilege of CAP_NET_ADMIN (or root) calls setsockopt to register umem ring on XDP socket, passing the headroom value larger than the available space in the chunk, it leads to an out-of-bounds write, causing panic or possible memory corruption. This flaw may lead to privilege escalation if a local end-user is granted permission to influence the execution of code in this manner.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12659"
        },
        {
          "category": "external",
          "summary": "RHBZ#1832876",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12659",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12659"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659"
        }
      ],
      "release_date": "2020-05-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption"
    },
    {
      "cve": "CVE-2020-12770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-05-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1834845"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in sg_write in drivers/scsi/sg.c in the SCSI generic (sg) driver subsystem. This flaw allows an attacker with local access and special user or root privileges to cause a denial of service if the allocated list is not cleaned with an invalid (Sg_fd * sfp) pointer at the time of failure, also possibly causing a kernel internal information leak problem.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "RHBZ#1834845",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770"
        }
      ],
      "release_date": "2020-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Adam Zabrocki"
          ]
        }
      ],
      "cve": "CVE-2020-12826",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "discovery_date": "2020-03-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1822077"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers.  A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "RHBZ#1822077",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12826",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da"
        },
        {
          "category": "external",
          "summary": "https://lists.openwall.net/linux-kernel/2020/03/24/1803",
          "url": "https://lists.openwall.net/linux-kernel/2020/03/24/1803"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1",
          "url": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1"
        }
      ],
      "release_date": "2020-05-12T05:40:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Rakesh Rakesh"
          ],
          "organization": "Netezza Support"
        }
      ],
      "cve": "CVE-2020-14381",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-09-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1874311"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "RHBZ#1874311",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14381",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254"
        }
      ],
      "release_date": "2020-05-07T19:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF"
    },
    {
      "cve": "CVE-2020-25641",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2020-09-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1881424"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of biovecs. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "RHBZ#1881424",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25641",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124"
        },
        {
          "category": "external",
          "summary": "https://www.kernel.org/doc/html/latest/block/biovecs.html",
          "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html"
        }
      ],
      "release_date": "2020-09-30T00:24:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Zhenpeng Lin"
          ]
        }
      ],
      "cve": "CVE-2021-3715",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-08-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1993988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "RHBZ#1993988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
        }
      ],
      "release_date": "2021-09-07T08:25:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
    }
  ]
}
  rhsa-2021_3320
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3320",
        "url": "https://access.redhat.com/errata/RHSA-2021:3320"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3320.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2024-11-15T11:55:37+00:00",
      "generator": {
        "date": "2024-11-15T11:55:37+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:3320",
      "initial_release_date": "2021-08-31T08:31:38+00:00",
      "revision_history": [
        {
          "date": "2021-08-31T08:31:38+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-31T08:31:39+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:55:37+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                  "product_id": "7Server-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                  "product_id": "7Server-optional-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                  "product_id": "7Server-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.80.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-957.80.1.el7.src",
                  "product_id": "kernel-0:3.10.0-957.80.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.80.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.80.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:31:38+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3320"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:31:38+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3320"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  rhsa-2021:2314
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\n* kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363)\n\n* kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364)\n\n* kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel crash when call the timer function (sctp_generate_proto_unreach_event) of sctp module (BZ#1707184)\n\n* SCSI error handling process on HP P440ar controller gets stuck indefinitely in device reset operation (BZ#1830268)\n\n* netfilter: reproducible deadlock on nft_log module autoload (BZ#1858329)\n\n* netfilter: NULL pointer dereference in nf_tables_set_lookup() (BZ#1873171)\n\n* [DELL EMC 7.9 Bug]: No acpi_pad threads on top command for \"power cap policy equal to 0 watts\" (BZ#1883174)\n\n* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache. (BZ#1886003)\n\n* netxen driver performs poorly with RT kernel (BZ#1894274)\n\n* gendisk-\u003edisk_part_tbl-\u003elast_lookup retains pointer after partition deletion (BZ#1898596)\n\n* Kernel experiences panic in update_group_power() due to division error even with Bug 1701115 fix (BZ#1910763)\n\n* RHEL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path (BZ#1917839)\n\n* RHEL7.9 - mm/THP: do not access vma-\u003evm_mm after calling handle_userfault (BZ#1917840)\n\n* raid: wrong raid io account (BZ#1927106)\n\n* qla2x00_status_cont_entry() missing upstream patch that prevents unnecessary ABRT/warnings (BZ#1933784)\n\n* RHEL 7.9.z - System hang caused by workqueue stall in qla2xxx driver (BZ#1937945)\n\n* selinux: setsebool can trigger a deadlock (BZ#1939091)\n\n* [Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V (BZ#1941841)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:2314",
        "url": "https://access.redhat.com/errata/RHSA-2021:2314"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1922249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
      },
      {
        "category": "external",
        "summary": "1930246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
      },
      {
        "category": "external",
        "summary": "1930249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
      },
      {
        "category": "external",
        "summary": "1930251",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
      },
      {
        "category": "external",
        "summary": "1940627",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
      },
      {
        "category": "external",
        "summary": "1941841",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941841"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2314.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T20:00:43+00:00",
      "generator": {
        "date": "2025-10-09T20:00:43+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:2314",
      "initial_release_date": "2021-06-08T22:46:51+00:00",
      "revision_history": [
        {
          "date": "2021-06-08T22:46:51+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-06-08T22:46:51+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:00:43+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.src",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.31.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.31.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "perf-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "perf-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "perf-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "perf-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2020-12362",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Integer overflow in Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8)  print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12362"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Integer overflow in Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-12363",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. Improper input validation in some Intel(R) Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper input validation in some Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12363",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Improper input validation in some Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-12364",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930251"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930251",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12364",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-27170",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2021-03-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1940627"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernels eBPF verification code. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN.   A local user with the ability to insert eBPF instructions can use the eBPF verifier to abuse a spectre like flaw where they can infer all system memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Speculation on pointer arithmetic against bpf_context pointer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-27170"
        },
        {
          "category": "external",
          "summary": "RHBZ#1940627",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27170",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170"
        }
      ],
      "release_date": "2021-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.   This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Speculation on pointer arithmetic against bpf_context pointer"
    },
    {
      "cve": "CVE-2021-3347",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-01-29T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1922249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Use after free via PI futex state",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "RHBZ#1922249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
        }
      ],
      "release_date": "2021-01-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Use after free via PI futex state"
    }
  ]
}
  RHSA-2020:4431
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in the video driver leads to local privilege escalation (CVE-2019-9458)\n\n* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)\n\n* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)\n\n* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)\n\n* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)\n\n* kernel: out-of-bounds write in ext4_xattr_set_entry (CVE-2019-19319)\n\n* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)\n\n* kernel: use-after-free in ext4_put_super (CVE-2019-19447)\n\n* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)\n\n* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)\n\n* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)\n\n* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)\n\n* kernel: use-after-free in debugfs_remove (CVE-2019-19770)\n\n* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)\n\n* kernel: possible use-after-free due to a race condition in cdev_get  (CVE-2020-0305)\n\n* kernel: out-of-bounds read in in vc_do_resize function (CVE-2020-8647)\n\n* kernel: use-after-free in n_tty_receive_buf_common function (CVE-2020-8648)\n\n* kernel: invalid read location in vgacon_invert_region function (CVE-2020-8649)\n\n* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)\n\n* kernel: SELinux netlink permission check bypass (CVE-2020-10751)\n\n* kernel: out-of-bounds write in mpol_parse_str  (CVE-2020-11565)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: buffer overflow in mt76_add_fragment function (CVE-2020-12465)\n\n* kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption (CVE-2020-12659)\n\n* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)\n\n* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)\n\n* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\n* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)\n\n* kernel: null pointer dereference in dlpar_parse_cc_property  (CVE-2019-12614)\n\n* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)\n\n* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)\n\n* kernel: memory leak in  af9005_identify_state() function (CVE-2019-18809)\n\n* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function (CVE-2019-19056)\n\n* kernel: memory leak in the crypto_report() function (CVE-2019-19062)\n\n* kernel: Two memory leaks in the rtl_usb_probe() function (CVE-2019-19063)\n\n* kernel: A memory leak in the rtl8xxxu_submit_int_urb() function (CVE-2019-19068)\n\n* kernel: A memory leak in the predicate_parse() function (CVE-2019-19072)\n\n* kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)\n\n* kernel: Null pointer dereference in drop_sysctl_table() (CVE-2019-20054)\n\n* kernel: kernel stack information leak on s390/s390x (CVE-2020-10773)\n\n* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)\n\n* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)\n\n* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:4431",
        "url": "https://access.redhat.com/errata/RHSA-2020:4431"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index"
      },
      {
        "category": "external",
        "summary": "1660798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660798"
      },
      {
        "category": "external",
        "summary": "1718176",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718176"
      },
      {
        "category": "external",
        "summary": "1759052",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052"
      },
      {
        "category": "external",
        "summary": "1760100",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100"
      },
      {
        "category": "external",
        "summary": "1760310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310"
      },
      {
        "category": "external",
        "summary": "1760420",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420"
      },
      {
        "category": "external",
        "summary": "1774946",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946"
      },
      {
        "category": "external",
        "summary": "1774963",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963"
      },
      {
        "category": "external",
        "summary": "1774988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988"
      },
      {
        "category": "external",
        "summary": "1775015",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015"
      },
      {
        "category": "external",
        "summary": "1775021",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021"
      },
      {
        "category": "external",
        "summary": "1775097",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097"
      },
      {
        "category": "external",
        "summary": "1777418",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418"
      },
      {
        "category": "external",
        "summary": "1777449",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449"
      },
      {
        "category": "external",
        "summary": "1778762",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778762"
      },
      {
        "category": "external",
        "summary": "1779594",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594"
      },
      {
        "category": "external",
        "summary": "1781679",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679"
      },
      {
        "category": "external",
        "summary": "1781810",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810"
      },
      {
        "category": "external",
        "summary": "1783459",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459"
      },
      {
        "category": "external",
        "summary": "1783534",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534"
      },
      {
        "category": "external",
        "summary": "1783561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561"
      },
      {
        "category": "external",
        "summary": "1784130",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130"
      },
      {
        "category": "external",
        "summary": "1786160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160"
      },
      {
        "category": "external",
        "summary": "1786179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179"
      },
      {
        "category": "external",
        "summary": "1790063",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063"
      },
      {
        "category": "external",
        "summary": "1802555",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1802563",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563"
      },
      {
        "category": "external",
        "summary": "1814448",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814448"
      },
      {
        "category": "external",
        "summary": "1817718",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718"
      },
      {
        "category": "external",
        "summary": "1819377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377"
      },
      {
        "category": "external",
        "summary": "1819399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399"
      },
      {
        "category": "external",
        "summary": "1820402",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820402"
      },
      {
        "category": "external",
        "summary": "1822077",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077"
      },
      {
        "category": "external",
        "summary": "1823764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823764"
      },
      {
        "category": "external",
        "summary": "1824059",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059"
      },
      {
        "category": "external",
        "summary": "1824792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
      },
      {
        "category": "external",
        "summary": "1824918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918"
      },
      {
        "category": "external",
        "summary": "1830280",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830280"
      },
      {
        "category": "external",
        "summary": "1831399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399"
      },
      {
        "category": "external",
        "summary": "1831699",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831699"
      },
      {
        "category": "external",
        "summary": "1832543",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543"
      },
      {
        "category": "external",
        "summary": "1832876",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876"
      },
      {
        "category": "external",
        "summary": "1834845",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845"
      },
      {
        "category": "external",
        "summary": "1839634",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634"
      },
      {
        "category": "external",
        "summary": "1844520",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844520"
      },
      {
        "category": "external",
        "summary": "1846380",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846380"
      },
      {
        "category": "external",
        "summary": "1846964",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964"
      },
      {
        "category": "external",
        "summary": "1853447",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853447"
      },
      {
        "category": "external",
        "summary": "1856588",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856588"
      },
      {
        "category": "external",
        "summary": "1860065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065"
      },
      {
        "category": "external",
        "summary": "1874311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311"
      },
      {
        "category": "external",
        "summary": "1881424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4431.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-10T02:11:38+00:00",
      "generator": {
        "date": "2025-10-10T02:11:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2020:4431",
      "initial_release_date": "2020-11-04T00:53:39+00:00",
      "revision_history": [
        {
          "date": "2020-11-04T00:53:39+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-11-04T00:53:39+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T02:11:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 8)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 8)",
                  "product_id": "CRB-8.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-240.el8.x86_64",
                  "product_id": "bpftool-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-core-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-240.el8.x86_64",
                  "product_id": "perf-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-240.el8.x86_64",
                  "product_id": "python3-perf-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "bpftool-0:4.18.0-240.el8.ppc64le",
                  "product_id": "bpftool-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-core-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-core-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-devel-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-devel-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-headers-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-headers-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-modules-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-modules-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-tools-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-tools-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "perf-0:4.18.0-240.el8.ppc64le",
                  "product_id": "perf-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "python3-perf-0:4.18.0-240.el8.ppc64le",
                  "product_id": "python3-perf-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "bpftool-0:4.18.0-240.el8.aarch64",
                  "product_id": "bpftool-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-core-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-core-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-devel-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-headers-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-modules-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-tools-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "perf-0:4.18.0-240.el8.aarch64",
                  "product_id": "perf-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "python3-perf-0:4.18.0-240.el8.aarch64",
                  "product_id": "python3-perf-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "bpftool-0:4.18.0-240.el8.s390x",
                  "product_id": "bpftool-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-core-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-core-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-core-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-devel-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-devel-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-headers-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-headers-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-modules-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-modules-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-tools-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-tools-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "perf-0:4.18.0-240.el8.s390x",
                  "product_id": "perf-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "python3-perf-0:4.18.0-240.el8.s390x",
                  "product_id": "python3-perf-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "perf-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.src",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.src",
                  "product_id": "kernel-0:4.18.0-240.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
                  "product_id": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-240.el8?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-240.el8.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-240.el8.noarch",
                  "product_id": "kernel-doc-0:4.18.0-240.el8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-240.el8?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.src",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-240.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-240.el8.noarch",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "perf-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "perf-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "perf-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.src",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-240.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-240.el8.noarch",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "perf-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "perf-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "perf-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-9455",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-09-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1819399"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s video driver. A kernel pointer lead, due to a WARN_ON statement could lead to a local information disclosure with system execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is marked as having Low impact because the information leak is very subtle and can be only used to break KASLR and not provide access to kernel memory content.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "RHBZ#1819399",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9455",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455"
        }
      ],
      "release_date": "2019-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure"
    },
    {
      "cve": "CVE-2019-9458",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-09-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1819377"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s video driver. A race condition, leading to a use-after-free, could lead to a local privilege escalation. User interaction is not needed for exploitation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use after free due to race condition in the video driver leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact, because of the need of additional privileges (usually local console user) to access the video device driver.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "RHBZ#1819377",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458"
        }
      ],
      "release_date": "2019-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent modules v4l2-common, v4l2-dv-timings from being loaded if not being used for primary display. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use after free due to race condition in the video driver leads to local privilege escalation"
    },
    {
      "cve": "CVE-2019-12614",
      "discovery_date": "2019-06-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1718176"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way Linux kernel\u0027s Dynamic Logical Partitioning (DLPAR) functionality on PowerPC systems handled low memory conditions on device discovery. An attacker who can change the LPAR configuration and incur low memory conditions at the same time could use this flaw to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "An attacker needs to be highly privileged to exploit this issue. He either needs to trigger LPAR configuration change (or wait for such event to happen) and incur low memory conditions at the same time. It could be argued that possessing privileges required to exploit this issue could have the same impact as the issue itself.\n\nThe indications say that this issue was found by static code analysing tool which looks for memory allocations without failure checks and not actually reproduced on a running system. The CVE assignment also looks automated and following the \"better be safe than sorry\" approach.\n\nAs such, this issue is theoretical in nature and Low impact at best.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-12614"
        },
        {
          "category": "external",
          "summary": "RHBZ#1718176",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718176"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12614",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12614",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12614"
        }
      ],
      "release_date": "2019-06-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service"
    },
    {
      "cve": "CVE-2019-15917",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-10-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760100"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of the HCI UART driver. A local attacker with access permissions to the Bluetooth device can issue an ioctl, which triggers the hci_uart_set_proto() function in drivers/bluetooth/hci_ldisc.c. The flaw in this function can cause memory corruption or a denial of service because of a use-after-free issue when the hci_uart_register_dev() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a Moderate as it requires the local attacker to have permissions to issue ioctl commands to the bluetooth device and bluetooth hardware to be present.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15917"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760100",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15917",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module hci_uart from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c"
    },
    {
      "cve": "CVE-2019-15925",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-09-05T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1759052"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds access flaw was found in the hclge_shaper_para_calc driver in the Linux kernel. Access to an array with an index higher than its maximum index will lead to an out-of-bounds access vulnerability. This could affect both data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15925"
        },
        {
          "category": "external",
          "summary": "RHBZ#1759052",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15925",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15925"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Blacklisting the affected HCLGE driver module until a patch is available can be done using the blacklist mechanism. This will ensure the driver is not loaded at boot time.  For instructions on how to black list a kernel module, please read: https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg"
    },
    {
      "cve": "CVE-2019-16231",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the FUJITSU Extended Socket Network driver. A call to the alloc_workqueue return was not validated and causes a denial of service at the time of failure. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16231",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2019/9/9/487",
          "url": "https://lkml.org/lkml/2019/9/9/487"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20191004-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20191004-0001/"
        }
      ],
      "release_date": "2019-09-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c"
    },
    {
      "cve": "CVE-2019-16233",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760420"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the QLOGIC drivers for HBA. A call to alloc_workqueue return was not validated and can cause a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760420",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16233",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2019/9/9/487",
          "url": "https://lkml.org/lkml/2019/9/9/487"
        }
      ],
      "release_date": "2019-09-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c"
    },
    {
      "cve": "CVE-2019-18808",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1777418"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the AMD Cryptographic Co-processor driver in the Linux kernel. An attacker, able to send invalid SHA type commands, could cause the system to crash. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because it affects only specific hardware enabled systems.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "RHBZ#1777418",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18808",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808"
        }
      ],
      "release_date": "2019-11-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module ccp. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c"
    },
    {
      "cve": "CVE-2019-18809",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-10-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1777449"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Afatech 9005 DVB-T receiver driver in the Linux kernel. An attacker, with physical access to the system, could cause the system to crash following a resource cleanup. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-18809"
        },
        {
          "category": "external",
          "summary": "RHBZ#1777449",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18809",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-18809"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809"
        }
      ],
      "release_date": "2019-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module dvb-usb-af9005. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c"
    },
    {
      "cve": "CVE-2019-19046",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak problem was found in __ipmi_bmc_register in drivers/char/ipmi/ipmi_msghandler.c in Intelligent Platform Management Interface (IPMI) which is used for incoming and outgoing message routing purpose. This flaw may allow an attacker with minimal privilege to cause a denial of service by triggering ida_simple_get() failure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19046"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19046",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046"
        }
      ],
      "release_date": "2019-11-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c"
    },
    {
      "cve": "CVE-2019-19056",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-19T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775097"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the mwifiex PCIE driver in the Linux kernel handled resource cleanup on a DMA mapping error. This flaw allows an attacker able to trigger the DMA mapping error to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (DMA mapping error).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19056"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775097",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19056",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19056"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056"
        }
      ],
      "release_date": "2019-10-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex_pcie. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS"
    },
    {
      "cve": "CVE-2019-19062",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775021"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The crypto_report function mishandles resource cleanup on error. A local attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error cleanup code path.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775021",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19062",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module crypto_user. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS"
    },
    {
      "cve": "CVE-2019-19063",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775015"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The rtl_usb_probe function mishandles resource cleanup on error. An attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19063"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775015",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19063",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8192cu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS"
    },
    {
      "cve": "CVE-2019-19068",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774963"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A memory leak in the realtek driver allows an attacker to cause a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (physical access and/or system-wide out-of-memory condition).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19068"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774963",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19068",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19068"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8xxxu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS"
    },
    {
      "cve": "CVE-2019-19072",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774946"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the predicate_parse function in the tracing subsystem of the Linux kernel handled resource cleanup on error. This flaw allows an attacker with the ability to produce the error to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (high privileges).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19072"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774946",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19072",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19072"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS"
    },
    {
      "cve": "CVE-2019-19319",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-12-16T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1784130"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s Ext4 FileSystem in the way it uses a crafted ext4 image. This flaw allows a local user with physical access to crash the system or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (physical access or user interaction to mount the crafted filesystem image).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "RHBZ#1784130",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19319",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319"
        }
      ],
      "release_date": "2019-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c"
    },
    {
      "cve": "CVE-2019-19332",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-12-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1779594"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory write issue was found in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "RHBZ#1779594",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19332",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/",
          "url": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2019/12/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2019/12/16/1"
        }
      ],
      "release_date": "2019-12-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid"
    },
    {
      "cve": "CVE-2019-19447",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781679"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s ext4_unlink function. An attacker could corrupt memory or escalate privileges when deleting a file from a recently unmounted specially crafted ext4 filesystem, including local, USB, and iSCSI.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781679",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19447",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=205433",
          "url": "https://bugzilla.kernel.org/show_bug.cgi?id=205433"
        },
        {
          "category": "external",
          "summary": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447",
          "url": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447"
        }
      ],
      "release_date": "2019-12-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Ext4 filesytems are built into the kernel so it is not possible to prevent the kernel module from loading.  However, this flaw can be prevented by disallowing mounting of untrusted filesystems.\n\nAs mounting is a privileged operation, (except for device hotplug) removing the ability for mounting and unmounting will prevent this flaw from being exploited.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c"
    },
    {
      "cve": "CVE-2019-19524",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783459"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s input device driver functionality when unplugging a device. A user with physical access could use this flaw to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783459",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19524",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524"
        }
      ],
      "release_date": "2019-11-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue for the Red Hat Enterprise Linux 7 or higher version, prevent module ff-memless from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free"
    },
    {
      "cve": "CVE-2019-19533",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-12-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783534"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An information leak flaw was found in the Linux kernel\u0027s USB digital video device driver. An attacker with a malicious USB device presenting itself as a \u0027Technotrend/Hauppauge USB DEC\u0027 device is able to issue commands to this specific device and leak kernel internal memory information.  The highest threat from this vulnerability is a breach of data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783534",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19533",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533"
        }
      ],
      "release_date": "2019-08-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "As the ttusb_dec module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install ttusb_dec /bin/true\" \u003e\u003e /etc/modprobe.d/disable-cifs.conf \n \nThe system will need to be restarted if the ttusb_dec module is already loaded. In most circumstances, the CIFS kernel module will be unable to be unloaded while the device is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c"
    },
    {
      "cve": "CVE-2019-19537",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2019-12-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783561"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel, where there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer. An attacker who can hotplug at least two devices of this class can cause a use-after-free situation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition caused by a malicious USB device in the USB character device driver layer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783561",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537"
        }
      ],
      "release_date": "2019-08-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Many Character devices can trigger this flaw as they leverage the lower levels of the USB subsystem.\n\nThe safest method that I have found would be to disable USB ports that are able to be attacked\nusing this method, disable them first by disallowing them from waking up from low-power states \nwith the command (Replace X with the port number available).\n\necho disabled \u003e\u003e /sys/bus/usb/devices/usbX/power/wakeup \n\nThe system must also disable the specific ports power after with the command:\n\necho suspend | sudo tee /sys/bus/usb/devices/usbX/power/level\n\nThis change not persist through system reboots and must be applied at each reboot to be effective.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition caused by a malicious USB device in the USB character device driver layer"
    },
    {
      "cve": "CVE-2019-19543",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781810"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s infrared serial module. An attacker could use this flaw to corrupt memory and possibly escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781810",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543"
        }
      ],
      "release_date": "2019-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "As the  module will be auto-loaded when the relevant hardware is required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install serial_ir  /bin/true\" \u003e\u003e /etc/modprobe.d/disable-serial-ir.conf \n \nThe system will need to be restarted if the CIFS modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c"
    },
    {
      "cve": "CVE-2019-19602",
      "cwe": {
        "id": "CWE-672",
        "name": "Operation on a Resource after Expiration or Release"
      },
      "discovery_date": "2019-12-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1784572"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. When compiled with GCC 9, a vector register corruption occurs on return from a signal handler where the top page of the signal stack had not yet been paged in which can allow a local attacker with special user privilege (or root) to leak kernel internal information. The highest threat from this vulnerability is to data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: cached use of fpu_fpregs_owner_ctx in arch/x86/include/asm/fpu/internal.h can lead to DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19602"
        },
        {
          "category": "external",
          "summary": "RHBZ#1784572",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784572"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19602",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19602"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19602",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19602"
        }
      ],
      "release_date": "2019-11-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: cached use of fpu_fpregs_owner_ctx in arch/x86/include/asm/fpu/internal.h can lead to DoS"
    },
    {
      "cve": "CVE-2019-19767",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-23T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1786160"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s ext4 file system functionality when the user mount ext4 partition, with the usage of an additional debug parameter is defining an extra inode size. If this parameter has a non zero value, this flaw allows a local user to crash the system when inode expansion happens.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "RHBZ#1786160",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19767",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767"
        }
      ],
      "release_date": "2019-11-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "The mitigation is not to use debug_want_extra_isize parameter when mounting ext4 FS.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c"
    },
    {
      "cve": "CVE-2019-19770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-23T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1786179"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the debugfs_remove function in the Linux kernel. The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal. This vulnerability can lead to a kernel information leak. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "RHBZ#1786179",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770"
        }
      ],
      "release_date": "2019-11-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c"
    },
    {
      "cve": "CVE-2019-20054",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2019-12-28T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1790063"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of dropping sysctl entries. A local attacker who has access to load modules on the system can trigger a condition during module load failure and panic the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "RHBZ#1790063",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20054",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054"
        }
      ],
      "release_date": "2019-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c"
    },
    {
      "cve": "CVE-2019-20636",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-04-08T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824059"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel. A crafted keycode table could be used by drivers/input/input.c to perform the out-of-bounds write. A local user with root access can insert garbage to this keycode table that can lead to out-of-bounds memory access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write via crafted keycode table",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue was rated as having Moderate impact because of the need of physical access or administrator privileges to trigger it.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20636"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824059",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20636",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636"
        }
      ],
      "release_date": "2020-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write via crafted keycode table"
    },
    {
      "cve": "CVE-2019-20812",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2020-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1846462"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the af_packet functionality in the Linux kernel handled the retirement timer setting for TPACKET_v3 when getting settings from the underlying network device errors out. This flaw allows a local user who can open the af_packet domain socket and who can hit the error path, to use this vulnerability to starve the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: af_packet: TPACKET_V3: invalid timer timeout on error",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the error code path and privileges required (CAP_NET_RAW).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20812"
        },
        {
          "category": "external",
          "summary": "RHBZ#1846462",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846462"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20812",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20812"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20812",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20812"
        }
      ],
      "release_date": "2019-12-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: af_packet: TPACKET_V3: invalid timer timeout on error"
    },
    {
      "cve": "CVE-2020-0305",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-07-17T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1860065"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way the Linux kernel\u0027s filesystem subsystem handled a race condition in the chrdev_open function. This flaw allows a privileged local user to starve the resources, causing a denial of service or potentially escalating their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (elevated/root privileges).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "RHBZ#1860065",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0305",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079"
        }
      ],
      "release_date": "2020-07-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c"
    },
    {
      "cve": "CVE-2020-0444",
      "cwe": {
        "id": "CWE-244",
        "name": "Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)"
      },
      "discovery_date": "2021-01-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1920474"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A logic error in audit_data_to_entry can lead to a local escalation of privilege without user interaction needed. A local attacker with special user privilege could crash the system leading to information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: bad kfree in auditfilter.c may lead to escalation of privilege",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-0444"
        },
        {
          "category": "external",
          "summary": "RHBZ#1920474",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920474"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0444",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-0444"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0444",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0444"
        }
      ],
      "release_date": "2021-01-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: bad kfree in auditfilter.c may lead to escalation of privilege"
    },
    {
      "cve": "CVE-2020-8647",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802563"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s virtual console resize functionality. An attacker with local access to virtual consoles can use the virtual console resizing code to gather kernel internal data structures.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having Moderate impact because the information leak is limited.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802563",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8647",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "The attack vector can be significantly reduced by preventing users from being able to log into the local virtual console.\n\nSee the instructions on disabling local login here: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/managing_smart_cards/pam_configuration_files , See the section on \"pam_console\" to deny users logging into the console.  This mechanism should work from el6 forward to current versions of Red Hat Enterprise Linux.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c"
    },
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2020-8649",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802555"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console. An out-of-bounds read can occur, leaking information to the console.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a having Moderate impact, it is an infoleak that is written to the screen.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802555",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8649",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c"
    },
    {
      "cve": "CVE-2020-10732",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "discovery_date": "2020-05-05T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1831399"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: uninitialized kernel data leak in userspace coredumps",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "RHBZ#1831399",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10732",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732"
        }
      ],
      "release_date": "2020-05-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Possible mitigation would be to disable core dumps system-wide by setting:\n\n* hard core 0\n\nIn the  /etc/security/limits.conf file and restarting applications/services/processes which users may have access to or simply reboot the system.  This disables core dumps which may not be a suitable workaround in your environment.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: uninitialized kernel data leak in userspace coredumps"
    },
    {
      "cve": "CVE-2020-10751",
      "cwe": {
        "id": "CWE-349",
        "name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
      },
      "discovery_date": "2020-05-25T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1839634"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SELinux netlink permission check bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "RHBZ#1839634",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10751",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/",
          "url": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2020/04/30/5",
          "url": "https://www.openwall.com/lists/oss-security/2020/04/30/5"
        }
      ],
      "release_date": "2020-04-27T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SELinux netlink permission check bypass"
    },
    {
      "cve": "CVE-2020-10773",
      "cwe": {
        "id": "CWE-626",
        "name": "Null Byte Interaction Error (Poison Null Byte)"
      },
      "discovery_date": "2019-10-28T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1846380"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u2019s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: kernel stack information leak on s390/s390x",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of being limited to only s390 architecture and very limited kernel stack exposure.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10773"
        },
        {
          "category": "external",
          "summary": "RHBZ#1846380",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846380"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10773",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10773"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10773",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10773"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f"
        }
      ],
      "release_date": "2019-10-28T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: kernel stack information leak on s390/s390x"
    },
    {
      "cve": "CVE-2020-10774",
      "cwe": {
        "id": "CWE-909",
        "name": "Missing Initialization of Resource"
      },
      "discovery_date": "2020-06-02T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1846964"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw memory disclosure flaw was found in the Linux kernel\u2019s sysctl subsystem in reading the /proc/sys/kernel/rh_features file. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the limited and random (non-controllable by attacker) memory disclosure.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10774"
        },
        {
          "category": "external",
          "summary": "RHBZ#1846964",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10774",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10774"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774"
        }
      ],
      "release_date": "2020-06-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features"
    },
    {
      "cve": "CVE-2020-10942",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2020-03-24T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1817718"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow issue was found in the get_raw_socket() routine of the Host kernel accelerator for virtio net (vhost-net) driver. It could occur while doing an ictol(VHOST_NET_SET_BACKEND) call, and retrieving socket name in a kernel stack variable via get_raw_socket(). A user able to perform ioctl(2) calls on the \u0027/dev/vhost-net\u0027 device may use this flaw to crash the kernel resulting in DoS issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the kernel package as shipped with the Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\nThis issue affects the kernel package as shipped with the Red Hat Enterprise Linux 6, 7 and 8. Future kernel updates for Red Hat Enterprise Linux 6, 7 and 8 may address this issue.\n\nIt is rated to have Low impact because it is quite difficult/unlikely to be triggered by a guest (or even host) user. In case it does happen, like in the upstream report, the stack overflow shall hit the stack canaries, resulting in DoS by crashing the kernel.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "RHBZ#1817718",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10942",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942"
        }
      ],
      "release_date": "2020-03-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field"
    },
    {
      "cve": "CVE-2020-11565",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-04-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824918"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel. An empty nodelist in mempolicy.c is mishandled durig mount option parsing leading to a stack-based out-of-bounds write. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-11565"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824918",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11565",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565"
        }
      ],
      "release_date": "2020-04-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c"
    },
    {
      "cve": "CVE-2020-11668",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2020-04-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824792"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824792",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668"
        }
      ],
      "release_date": "2020-01-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c"
    },
    {
      "cve": "CVE-2020-12465",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2020-04-29T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1831699"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory overflow and data corruption flaw were found in the Mediatek MT76 driver module for WiFi in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c. An oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with a special user or root privileges can cause a denial of service or a leak of internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12465"
        },
        {
          "category": "external",
          "summary": "RHBZ#1831699",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831699"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12465",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12465"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12465",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12465"
        }
      ],
      "release_date": "2020-03-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is to skip loading the affected module mt76 onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c"
    },
    {
      "cve": "CVE-2020-12655",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2020-05-05T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1832543"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger it (administrative account or physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "RHBZ#1832543",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12655",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655"
        }
      ],
      "release_date": "2020-03-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "This flaw requires an attacker being able to have the system mount a crafted filesystem.\n\nIf the xfs filesystem is not in use, the \u0027xfs\u0027 kernel module can be blacklisted and the module\nwill not be loaded when the filesystem is mounted, mounting will fail.\n\nHowever, if this filesystem is in use, this workaround will not be suitable.\n\nTo find out how to blacklist the \"xfs\" kernel module please see https://access.redhat.com/solutions/41278 or contact Red hat Global Support services",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata"
    },
    {
      "cve": "CVE-2020-12659",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-05-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1832876"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds (OOB) memory access flaw was found in the Network XDP (the eXpress Data Path) module in the Linux kernel\u0027s xdp_umem_reg function in net/xdp/xdp_umem.c. When a user with special user privilege of CAP_NET_ADMIN (or root) calls setsockopt to register umem ring on XDP socket, passing the headroom value larger than the available space in the chunk, it leads to an out-of-bounds write, causing panic or possible memory corruption. This flaw may lead to privilege escalation if a local end-user is granted permission to influence the execution of code in this manner.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12659"
        },
        {
          "category": "external",
          "summary": "RHBZ#1832876",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12659",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12659"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659"
        }
      ],
      "release_date": "2020-05-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption"
    },
    {
      "cve": "CVE-2020-12770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-05-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1834845"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in sg_write in drivers/scsi/sg.c in the SCSI generic (sg) driver subsystem. This flaw allows an attacker with local access and special user or root privileges to cause a denial of service if the allocated list is not cleaned with an invalid (Sg_fd * sfp) pointer at the time of failure, also possibly causing a kernel internal information leak problem.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "RHBZ#1834845",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770"
        }
      ],
      "release_date": "2020-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Adam Zabrocki"
          ]
        }
      ],
      "cve": "CVE-2020-12826",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "discovery_date": "2020-03-27T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1822077"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers.  A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "RHBZ#1822077",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12826",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da"
        },
        {
          "category": "external",
          "summary": "https://lists.openwall.net/linux-kernel/2020/03/24/1803",
          "url": "https://lists.openwall.net/linux-kernel/2020/03/24/1803"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1",
          "url": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1"
        }
      ],
      "release_date": "2020-05-12T05:40:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Rakesh Rakesh"
          ],
          "organization": "Netezza Support"
        }
      ],
      "cve": "CVE-2020-14381",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-09-01T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1874311"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "RHBZ#1874311",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14381",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254"
        }
      ],
      "release_date": "2020-05-07T19:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF"
    },
    {
      "cve": "CVE-2020-25641",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2020-09-17T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1881424"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of biovecs. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "RHBZ#1881424",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25641",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124"
        },
        {
          "category": "external",
          "summary": "https://www.kernel.org/doc/html/latest/block/biovecs.html",
          "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html"
        }
      ],
      "release_date": "2020-09-30T00:24:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Zhenpeng Lin"
          ]
        }
      ],
      "cve": "CVE-2021-3715",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-08-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1993988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "RHBZ#1993988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
        }
      ],
      "release_date": "2021-09-07T08:25:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
    },
    {
      "cve": "CVE-2022-50219",
      "discovery_date": "2025-06-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2373517"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix KASAN use-after-free Read in compute_effective_progs\n\nSyzbot found a Use After Free bug in compute_effective_progs().\nThe reproducer creates a number of BPF links, and causes a fault\ninjected alloc to fail, while calling bpf_link_detach on them.\nLink detach triggers the link to be freed by bpf_link_free(),\nwhich calls __cgroup_bpf_detach() and update_effective_progs().\nIf the memory allocation in this function fails, the function restores\nthe pointer to the bpf_cgroup_link on the cgroup list, but the memory\ngets freed just after it returns. After this, every subsequent call to\nupdate_effective_progs() causes this already deallocated pointer to be\ndereferenced in prog_list_length(), and triggers KASAN UAF error.\n\nTo fix this issue don\u0027t preserve the pointer to the prog or link in the\nlist, but remove it and replace it with a dummy prog without shrinking\nthe table. The subsequent call to __cgroup_bpf_detach() or\n__cgroup_bpf_detach() will correct it.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: bpf: Fix KASAN use-after-free Read in compute_effective_progs",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-50219"
        },
        {
          "category": "external",
          "summary": "RHBZ#2373517",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373517"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-50219",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-50219"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50219",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50219"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2025061846-CVE-2022-50219-a138@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2025061846-CVE-2022-50219-a138@gregkh/T"
        }
      ],
      "release_date": "2025-06-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: bpf: Fix KASAN use-after-free Read in compute_effective_progs"
    },
    {
      "cve": "CVE-2025-21727",
      "cwe": {
        "id": "CWE-820",
        "name": "Missing Synchronization"
      },
      "discovery_date": "2025-02-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2348516"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: fix UAF in padata_reorder\n\nA bug was found when run ltp test:\n\nBUG: KASAN: slab-use-after-free in padata_find_next+0x29/0x1a0\nRead of size 4 at addr ffff88bbfe003524 by task kworker/u113:2/3039206\n\nCPU: 0 PID: 3039206 Comm: kworker/u113:2 Kdump: loaded Not tainted 6.6.0+\nWorkqueue: pdecrypt_parallel padata_parallel_worker\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x32/0x50\nprint_address_description.constprop.0+0x6b/0x3d0\nprint_report+0xdd/0x2c0\nkasan_report+0xa5/0xd0\npadata_find_next+0x29/0x1a0\npadata_reorder+0x131/0x220\npadata_parallel_worker+0x3d/0xc0\nprocess_one_work+0x2ec/0x5a0\n\nIf \u0027mdelay(10)\u0027 is added before calling \u0027padata_find_next\u0027 in the\n\u0027padata_reorder\u0027 function, this issue could be reproduced easily with\nltp test (pcrypt_aead01).\n\nThis can be explained as bellow:\n\npcrypt_aead_encrypt\n...\npadata_do_parallel\nrefcount_inc(\u0026pd-\u003erefcnt); // add refcnt\n...\npadata_do_serial\npadata_reorder // pd\nwhile (1) {\npadata_find_next(pd, true); // using pd\nqueue_work_on\n...\npadata_serial_worker\t\t\t\tcrypto_del_alg\npadata_put_pd_cnt // sub refcnt\n\t\t\t\t\t\tpadata_free_shell\n\t\t\t\t\t\tpadata_put_pd(ps-\u003epd);\n\t\t\t\t\t\t// pd is freed\n// loop again, but pd is freed\n// call padata_find_next, UAF\n}\n\nIn the padata_reorder function, when it loops in \u0027while\u0027, if the alg is\ndeleted, the refcnt may be decreased to 0 before entering\n\u0027padata_find_next\u0027, which leads to UAF.\n\nAs mentioned in [1], do_serial is supposed to be called with BHs disabled\nand always happen under RCU protection, to address this issue, add\nsynchronize_rcu() in \u0027padata_free_shell\u0027 wait for all _do_serial calls\nto finish.\n\n[1] https://lore.kernel.org/all/20221028160401.cccypv4euxikusiq@parnassus.localdomain/\n[2] https://lore.kernel.org/linux-kernel/jfjz5d7zwbytztackem7ibzalm5lnxldi2eofeiczqmqs2m7o6@fq426cwnjtkm/",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: padata: fix UAF in padata_reorder",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21727"
        },
        {
          "category": "external",
          "summary": "RHBZ#2348516",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348516"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21727",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21727",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21727"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21727-b034@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21727-b034@gregkh/T"
        }
      ],
      "release_date": "2025-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: padata: fix UAF in padata_reorder"
    }
  ]
}
  rhsa-2021:3320
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3320",
        "url": "https://access.redhat.com/errata/RHSA-2021:3320"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3320.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2025-10-09T20:53:40+00:00",
      "generator": {
        "date": "2025-10-09T20:53:40+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3320",
      "initial_release_date": "2021-08-31T08:31:38+00:00",
      "revision_history": [
        {
          "date": "2021-08-31T08:31:38+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-31T08:31:39+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:53:40+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                  "product_id": "7Server-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                  "product_id": "7Server-optional-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                  "product_id": "7Server-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.80.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-957.80.1.el7.src",
                  "product_id": "kernel-0:3.10.0-957.80.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.80.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.80.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:31:38+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3320"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:31:38+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3320"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  RHSA-2021:2316
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\n* kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363)\n\n* kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364)\n\n* kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* lru-add-drain workqueue on RT is allocated without being used (BZ#1894587)\n\n* kernel-rt: update to the latest RHEL7.9.z source tree (BZ#1953118)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:2316",
        "url": "https://access.redhat.com/errata/RHSA-2021:2316"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1894587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894587"
      },
      {
        "category": "external",
        "summary": "1922249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
      },
      {
        "category": "external",
        "summary": "1930246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
      },
      {
        "category": "external",
        "summary": "1930249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
      },
      {
        "category": "external",
        "summary": "1930251",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
      },
      {
        "category": "external",
        "summary": "1940627",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2316.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T20:00:43+00:00",
      "generator": {
        "date": "2025-10-09T20:00:43+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:2316",
      "initial_release_date": "2021-06-08T22:44:01+00:00",
      "revision_history": [
        {
          "date": "2021-06-08T22:44:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-06-08T22:44:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:00:43+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
                  "product_id": "7Server-NFV-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time (v. 7)",
                  "product_id": "7Server-RT-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt:7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
                  "product_id": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.31.1.rt56.1169.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
                  "product_id": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.31.1.rt56.1169.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2020-12362",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Integer overflow in Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8)  print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12362"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Integer overflow in Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-12363",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. Improper input validation in some Intel(R) Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper input validation in some Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12363",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Improper input validation in some Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-12364",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930251"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930251",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12364",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-27170",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2021-03-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1940627"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernels eBPF verification code. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN.   A local user with the ability to insert eBPF instructions can use the eBPF verifier to abuse a spectre like flaw where they can infer all system memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Speculation on pointer arithmetic against bpf_context pointer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-27170"
        },
        {
          "category": "external",
          "summary": "RHBZ#1940627",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27170",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170"
        }
      ],
      "release_date": "2021-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.   This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Speculation on pointer arithmetic against bpf_context pointer"
    },
    {
      "cve": "CVE-2021-3347",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-01-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1922249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Use after free via PI futex state",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "RHBZ#1922249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
        }
      ],
      "release_date": "2021-01-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Use after free via PI futex state"
    }
  ]
}
  rhsa-2020:4431
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in the video driver leads to local privilege escalation (CVE-2019-9458)\n\n* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)\n\n* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)\n\n* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)\n\n* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)\n\n* kernel: out-of-bounds write in ext4_xattr_set_entry (CVE-2019-19319)\n\n* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)\n\n* kernel: use-after-free in ext4_put_super (CVE-2019-19447)\n\n* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)\n\n* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)\n\n* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)\n\n* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)\n\n* kernel: use-after-free in debugfs_remove (CVE-2019-19770)\n\n* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)\n\n* kernel: possible use-after-free due to a race condition in cdev_get  (CVE-2020-0305)\n\n* kernel: out-of-bounds read in in vc_do_resize function (CVE-2020-8647)\n\n* kernel: use-after-free in n_tty_receive_buf_common function (CVE-2020-8648)\n\n* kernel: invalid read location in vgacon_invert_region function (CVE-2020-8649)\n\n* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)\n\n* kernel: SELinux netlink permission check bypass (CVE-2020-10751)\n\n* kernel: out-of-bounds write in mpol_parse_str  (CVE-2020-11565)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: buffer overflow in mt76_add_fragment function (CVE-2020-12465)\n\n* kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption (CVE-2020-12659)\n\n* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)\n\n* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)\n\n* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\n* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)\n\n* kernel: null pointer dereference in dlpar_parse_cc_property  (CVE-2019-12614)\n\n* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)\n\n* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)\n\n* kernel: memory leak in  af9005_identify_state() function (CVE-2019-18809)\n\n* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function (CVE-2019-19056)\n\n* kernel: memory leak in the crypto_report() function (CVE-2019-19062)\n\n* kernel: Two memory leaks in the rtl_usb_probe() function (CVE-2019-19063)\n\n* kernel: A memory leak in the rtl8xxxu_submit_int_urb() function (CVE-2019-19068)\n\n* kernel: A memory leak in the predicate_parse() function (CVE-2019-19072)\n\n* kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)\n\n* kernel: Null pointer dereference in drop_sysctl_table() (CVE-2019-20054)\n\n* kernel: kernel stack information leak on s390/s390x (CVE-2020-10773)\n\n* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)\n\n* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)\n\n* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:4431",
        "url": "https://access.redhat.com/errata/RHSA-2020:4431"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index"
      },
      {
        "category": "external",
        "summary": "1660798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660798"
      },
      {
        "category": "external",
        "summary": "1718176",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718176"
      },
      {
        "category": "external",
        "summary": "1759052",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052"
      },
      {
        "category": "external",
        "summary": "1760100",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100"
      },
      {
        "category": "external",
        "summary": "1760310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310"
      },
      {
        "category": "external",
        "summary": "1760420",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420"
      },
      {
        "category": "external",
        "summary": "1774946",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946"
      },
      {
        "category": "external",
        "summary": "1774963",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963"
      },
      {
        "category": "external",
        "summary": "1774988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988"
      },
      {
        "category": "external",
        "summary": "1775015",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015"
      },
      {
        "category": "external",
        "summary": "1775021",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021"
      },
      {
        "category": "external",
        "summary": "1775097",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097"
      },
      {
        "category": "external",
        "summary": "1777418",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418"
      },
      {
        "category": "external",
        "summary": "1777449",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449"
      },
      {
        "category": "external",
        "summary": "1778762",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778762"
      },
      {
        "category": "external",
        "summary": "1779594",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594"
      },
      {
        "category": "external",
        "summary": "1781679",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679"
      },
      {
        "category": "external",
        "summary": "1781810",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810"
      },
      {
        "category": "external",
        "summary": "1783459",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459"
      },
      {
        "category": "external",
        "summary": "1783534",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534"
      },
      {
        "category": "external",
        "summary": "1783561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561"
      },
      {
        "category": "external",
        "summary": "1784130",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130"
      },
      {
        "category": "external",
        "summary": "1786160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160"
      },
      {
        "category": "external",
        "summary": "1786179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179"
      },
      {
        "category": "external",
        "summary": "1790063",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063"
      },
      {
        "category": "external",
        "summary": "1802555",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1802563",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563"
      },
      {
        "category": "external",
        "summary": "1814448",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814448"
      },
      {
        "category": "external",
        "summary": "1817718",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718"
      },
      {
        "category": "external",
        "summary": "1819377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377"
      },
      {
        "category": "external",
        "summary": "1819399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399"
      },
      {
        "category": "external",
        "summary": "1820402",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820402"
      },
      {
        "category": "external",
        "summary": "1822077",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077"
      },
      {
        "category": "external",
        "summary": "1823764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823764"
      },
      {
        "category": "external",
        "summary": "1824059",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059"
      },
      {
        "category": "external",
        "summary": "1824792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
      },
      {
        "category": "external",
        "summary": "1824918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918"
      },
      {
        "category": "external",
        "summary": "1830280",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830280"
      },
      {
        "category": "external",
        "summary": "1831399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399"
      },
      {
        "category": "external",
        "summary": "1831699",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831699"
      },
      {
        "category": "external",
        "summary": "1832543",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543"
      },
      {
        "category": "external",
        "summary": "1832876",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876"
      },
      {
        "category": "external",
        "summary": "1834845",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845"
      },
      {
        "category": "external",
        "summary": "1839634",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634"
      },
      {
        "category": "external",
        "summary": "1844520",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844520"
      },
      {
        "category": "external",
        "summary": "1846380",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846380"
      },
      {
        "category": "external",
        "summary": "1846964",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964"
      },
      {
        "category": "external",
        "summary": "1853447",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853447"
      },
      {
        "category": "external",
        "summary": "1856588",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856588"
      },
      {
        "category": "external",
        "summary": "1860065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065"
      },
      {
        "category": "external",
        "summary": "1874311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311"
      },
      {
        "category": "external",
        "summary": "1881424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4431.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2025-10-10T02:11:38+00:00",
      "generator": {
        "date": "2025-10-10T02:11:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2020:4431",
      "initial_release_date": "2020-11-04T00:53:39+00:00",
      "revision_history": [
        {
          "date": "2020-11-04T00:53:39+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-11-04T00:53:39+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T02:11:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 8)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 8)",
                  "product_id": "CRB-8.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-240.el8.x86_64",
                  "product_id": "bpftool-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-core-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-240.el8.x86_64",
                  "product_id": "perf-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-240.el8.x86_64",
                  "product_id": "python3-perf-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "bpftool-0:4.18.0-240.el8.ppc64le",
                  "product_id": "bpftool-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-core-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-core-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-devel-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-devel-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-headers-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-headers-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-modules-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-modules-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-tools-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-tools-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "perf-0:4.18.0-240.el8.ppc64le",
                  "product_id": "perf-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "python3-perf-0:4.18.0-240.el8.ppc64le",
                  "product_id": "python3-perf-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "bpftool-0:4.18.0-240.el8.aarch64",
                  "product_id": "bpftool-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-core-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-core-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-devel-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-headers-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-modules-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-tools-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "perf-0:4.18.0-240.el8.aarch64",
                  "product_id": "perf-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "python3-perf-0:4.18.0-240.el8.aarch64",
                  "product_id": "python3-perf-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "bpftool-0:4.18.0-240.el8.s390x",
                  "product_id": "bpftool-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-core-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-core-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-core-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-devel-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-devel-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-headers-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-headers-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-modules-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-modules-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-tools-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-tools-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "perf-0:4.18.0-240.el8.s390x",
                  "product_id": "perf-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "python3-perf-0:4.18.0-240.el8.s390x",
                  "product_id": "python3-perf-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "perf-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.src",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.src",
                  "product_id": "kernel-0:4.18.0-240.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
                  "product_id": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-240.el8?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-240.el8.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-240.el8.noarch",
                  "product_id": "kernel-doc-0:4.18.0-240.el8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-240.el8?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.src",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-240.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-240.el8.noarch",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "perf-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "perf-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "perf-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.src",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-240.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-240.el8.noarch",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "perf-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "perf-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "perf-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-9455",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-09-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1819399"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s video driver. A kernel pointer lead, due to a WARN_ON statement could lead to a local information disclosure with system execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is marked as having Low impact because the information leak is very subtle and can be only used to break KASLR and not provide access to kernel memory content.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "RHBZ#1819399",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9455",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455"
        }
      ],
      "release_date": "2019-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure"
    },
    {
      "cve": "CVE-2019-9458",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-09-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1819377"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s video driver. A race condition, leading to a use-after-free, could lead to a local privilege escalation. User interaction is not needed for exploitation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use after free due to race condition in the video driver leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact, because of the need of additional privileges (usually local console user) to access the video device driver.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "RHBZ#1819377",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458"
        }
      ],
      "release_date": "2019-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent modules v4l2-common, v4l2-dv-timings from being loaded if not being used for primary display. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use after free due to race condition in the video driver leads to local privilege escalation"
    },
    {
      "cve": "CVE-2019-12614",
      "discovery_date": "2019-06-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1718176"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way Linux kernel\u0027s Dynamic Logical Partitioning (DLPAR) functionality on PowerPC systems handled low memory conditions on device discovery. An attacker who can change the LPAR configuration and incur low memory conditions at the same time could use this flaw to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "An attacker needs to be highly privileged to exploit this issue. He either needs to trigger LPAR configuration change (or wait for such event to happen) and incur low memory conditions at the same time. It could be argued that possessing privileges required to exploit this issue could have the same impact as the issue itself.\n\nThe indications say that this issue was found by static code analysing tool which looks for memory allocations without failure checks and not actually reproduced on a running system. The CVE assignment also looks automated and following the \"better be safe than sorry\" approach.\n\nAs such, this issue is theoretical in nature and Low impact at best.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-12614"
        },
        {
          "category": "external",
          "summary": "RHBZ#1718176",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718176"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12614",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12614",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12614"
        }
      ],
      "release_date": "2019-06-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service"
    },
    {
      "cve": "CVE-2019-15917",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-10-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760100"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of the HCI UART driver. A local attacker with access permissions to the Bluetooth device can issue an ioctl, which triggers the hci_uart_set_proto() function in drivers/bluetooth/hci_ldisc.c. The flaw in this function can cause memory corruption or a denial of service because of a use-after-free issue when the hci_uart_register_dev() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a Moderate as it requires the local attacker to have permissions to issue ioctl commands to the bluetooth device and bluetooth hardware to be present.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15917"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760100",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15917",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module hci_uart from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c"
    },
    {
      "cve": "CVE-2019-15925",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-09-05T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1759052"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds access flaw was found in the hclge_shaper_para_calc driver in the Linux kernel. Access to an array with an index higher than its maximum index will lead to an out-of-bounds access vulnerability. This could affect both data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15925"
        },
        {
          "category": "external",
          "summary": "RHBZ#1759052",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15925",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15925"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Blacklisting the affected HCLGE driver module until a patch is available can be done using the blacklist mechanism. This will ensure the driver is not loaded at boot time.  For instructions on how to black list a kernel module, please read: https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg"
    },
    {
      "cve": "CVE-2019-16231",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the FUJITSU Extended Socket Network driver. A call to the alloc_workqueue return was not validated and causes a denial of service at the time of failure. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16231",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2019/9/9/487",
          "url": "https://lkml.org/lkml/2019/9/9/487"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20191004-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20191004-0001/"
        }
      ],
      "release_date": "2019-09-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c"
    },
    {
      "cve": "CVE-2019-16233",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760420"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the QLOGIC drivers for HBA. A call to alloc_workqueue return was not validated and can cause a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760420",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16233",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2019/9/9/487",
          "url": "https://lkml.org/lkml/2019/9/9/487"
        }
      ],
      "release_date": "2019-09-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c"
    },
    {
      "cve": "CVE-2019-18808",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1777418"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the AMD Cryptographic Co-processor driver in the Linux kernel. An attacker, able to send invalid SHA type commands, could cause the system to crash. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because it affects only specific hardware enabled systems.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "RHBZ#1777418",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18808",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808"
        }
      ],
      "release_date": "2019-11-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module ccp. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c"
    },
    {
      "cve": "CVE-2019-18809",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-10-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1777449"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Afatech 9005 DVB-T receiver driver in the Linux kernel. An attacker, with physical access to the system, could cause the system to crash following a resource cleanup. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-18809"
        },
        {
          "category": "external",
          "summary": "RHBZ#1777449",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18809",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-18809"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809"
        }
      ],
      "release_date": "2019-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module dvb-usb-af9005. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c"
    },
    {
      "cve": "CVE-2019-19046",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak problem was found in __ipmi_bmc_register in drivers/char/ipmi/ipmi_msghandler.c in Intelligent Platform Management Interface (IPMI) which is used for incoming and outgoing message routing purpose. This flaw may allow an attacker with minimal privilege to cause a denial of service by triggering ida_simple_get() failure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19046"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19046",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046"
        }
      ],
      "release_date": "2019-11-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c"
    },
    {
      "cve": "CVE-2019-19056",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-19T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775097"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the mwifiex PCIE driver in the Linux kernel handled resource cleanup on a DMA mapping error. This flaw allows an attacker able to trigger the DMA mapping error to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (DMA mapping error).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19056"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775097",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19056",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19056"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056"
        }
      ],
      "release_date": "2019-10-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex_pcie. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS"
    },
    {
      "cve": "CVE-2019-19062",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775021"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The crypto_report function mishandles resource cleanup on error. A local attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error cleanup code path.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775021",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19062",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module crypto_user. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS"
    },
    {
      "cve": "CVE-2019-19063",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775015"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The rtl_usb_probe function mishandles resource cleanup on error. An attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19063"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775015",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19063",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8192cu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS"
    },
    {
      "cve": "CVE-2019-19068",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774963"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A memory leak in the realtek driver allows an attacker to cause a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (physical access and/or system-wide out-of-memory condition).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19068"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774963",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19068",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19068"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8xxxu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS"
    },
    {
      "cve": "CVE-2019-19072",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774946"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the predicate_parse function in the tracing subsystem of the Linux kernel handled resource cleanup on error. This flaw allows an attacker with the ability to produce the error to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (high privileges).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19072"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774946",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19072",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19072"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS"
    },
    {
      "cve": "CVE-2019-19319",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-12-16T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1784130"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s Ext4 FileSystem in the way it uses a crafted ext4 image. This flaw allows a local user with physical access to crash the system or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (physical access or user interaction to mount the crafted filesystem image).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "RHBZ#1784130",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19319",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319"
        }
      ],
      "release_date": "2019-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c"
    },
    {
      "cve": "CVE-2019-19332",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-12-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1779594"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory write issue was found in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "RHBZ#1779594",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19332",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/",
          "url": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2019/12/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2019/12/16/1"
        }
      ],
      "release_date": "2019-12-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid"
    },
    {
      "cve": "CVE-2019-19447",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781679"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s ext4_unlink function. An attacker could corrupt memory or escalate privileges when deleting a file from a recently unmounted specially crafted ext4 filesystem, including local, USB, and iSCSI.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781679",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19447",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=205433",
          "url": "https://bugzilla.kernel.org/show_bug.cgi?id=205433"
        },
        {
          "category": "external",
          "summary": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447",
          "url": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447"
        }
      ],
      "release_date": "2019-12-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Ext4 filesytems are built into the kernel so it is not possible to prevent the kernel module from loading.  However, this flaw can be prevented by disallowing mounting of untrusted filesystems.\n\nAs mounting is a privileged operation, (except for device hotplug) removing the ability for mounting and unmounting will prevent this flaw from being exploited.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c"
    },
    {
      "cve": "CVE-2019-19524",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783459"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s input device driver functionality when unplugging a device. A user with physical access could use this flaw to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783459",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19524",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524"
        }
      ],
      "release_date": "2019-11-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue for the Red Hat Enterprise Linux 7 or higher version, prevent module ff-memless from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free"
    },
    {
      "cve": "CVE-2019-19533",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-12-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783534"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An information leak flaw was found in the Linux kernel\u0027s USB digital video device driver. An attacker with a malicious USB device presenting itself as a \u0027Technotrend/Hauppauge USB DEC\u0027 device is able to issue commands to this specific device and leak kernel internal memory information.  The highest threat from this vulnerability is a breach of data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783534",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19533",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533"
        }
      ],
      "release_date": "2019-08-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "As the ttusb_dec module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install ttusb_dec /bin/true\" \u003e\u003e /etc/modprobe.d/disable-cifs.conf \n \nThe system will need to be restarted if the ttusb_dec module is already loaded. In most circumstances, the CIFS kernel module will be unable to be unloaded while the device is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c"
    },
    {
      "cve": "CVE-2019-19537",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2019-12-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783561"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel, where there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer. An attacker who can hotplug at least two devices of this class can cause a use-after-free situation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition caused by a malicious USB device in the USB character device driver layer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783561",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537"
        }
      ],
      "release_date": "2019-08-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Many Character devices can trigger this flaw as they leverage the lower levels of the USB subsystem.\n\nThe safest method that I have found would be to disable USB ports that are able to be attacked\nusing this method, disable them first by disallowing them from waking up from low-power states \nwith the command (Replace X with the port number available).\n\necho disabled \u003e\u003e /sys/bus/usb/devices/usbX/power/wakeup \n\nThe system must also disable the specific ports power after with the command:\n\necho suspend | sudo tee /sys/bus/usb/devices/usbX/power/level\n\nThis change not persist through system reboots and must be applied at each reboot to be effective.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition caused by a malicious USB device in the USB character device driver layer"
    },
    {
      "cve": "CVE-2019-19543",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781810"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s infrared serial module. An attacker could use this flaw to corrupt memory and possibly escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781810",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543"
        }
      ],
      "release_date": "2019-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "As the  module will be auto-loaded when the relevant hardware is required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install serial_ir  /bin/true\" \u003e\u003e /etc/modprobe.d/disable-serial-ir.conf \n \nThe system will need to be restarted if the CIFS modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c"
    },
    {
      "cve": "CVE-2019-19602",
      "cwe": {
        "id": "CWE-672",
        "name": "Operation on a Resource after Expiration or Release"
      },
      "discovery_date": "2019-12-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1784572"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. When compiled with GCC 9, a vector register corruption occurs on return from a signal handler where the top page of the signal stack had not yet been paged in which can allow a local attacker with special user privilege (or root) to leak kernel internal information. The highest threat from this vulnerability is to data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: cached use of fpu_fpregs_owner_ctx in arch/x86/include/asm/fpu/internal.h can lead to DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19602"
        },
        {
          "category": "external",
          "summary": "RHBZ#1784572",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784572"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19602",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19602"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19602",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19602"
        }
      ],
      "release_date": "2019-11-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: cached use of fpu_fpregs_owner_ctx in arch/x86/include/asm/fpu/internal.h can lead to DoS"
    },
    {
      "cve": "CVE-2019-19767",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-23T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1786160"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s ext4 file system functionality when the user mount ext4 partition, with the usage of an additional debug parameter is defining an extra inode size. If this parameter has a non zero value, this flaw allows a local user to crash the system when inode expansion happens.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "RHBZ#1786160",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19767",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767"
        }
      ],
      "release_date": "2019-11-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "The mitigation is not to use debug_want_extra_isize parameter when mounting ext4 FS.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c"
    },
    {
      "cve": "CVE-2019-19770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-23T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1786179"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the debugfs_remove function in the Linux kernel. The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal. This vulnerability can lead to a kernel information leak. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "RHBZ#1786179",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770"
        }
      ],
      "release_date": "2019-11-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c"
    },
    {
      "cve": "CVE-2019-20054",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2019-12-28T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1790063"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of dropping sysctl entries. A local attacker who has access to load modules on the system can trigger a condition during module load failure and panic the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "RHBZ#1790063",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20054",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054"
        }
      ],
      "release_date": "2019-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c"
    },
    {
      "cve": "CVE-2019-20636",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-04-08T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824059"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel. A crafted keycode table could be used by drivers/input/input.c to perform the out-of-bounds write. A local user with root access can insert garbage to this keycode table that can lead to out-of-bounds memory access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write via crafted keycode table",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue was rated as having Moderate impact because of the need of physical access or administrator privileges to trigger it.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20636"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824059",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20636",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636"
        }
      ],
      "release_date": "2020-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write via crafted keycode table"
    },
    {
      "cve": "CVE-2019-20812",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2020-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1846462"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the af_packet functionality in the Linux kernel handled the retirement timer setting for TPACKET_v3 when getting settings from the underlying network device errors out. This flaw allows a local user who can open the af_packet domain socket and who can hit the error path, to use this vulnerability to starve the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: af_packet: TPACKET_V3: invalid timer timeout on error",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the error code path and privileges required (CAP_NET_RAW).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20812"
        },
        {
          "category": "external",
          "summary": "RHBZ#1846462",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846462"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20812",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20812"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20812",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20812"
        }
      ],
      "release_date": "2019-12-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: af_packet: TPACKET_V3: invalid timer timeout on error"
    },
    {
      "cve": "CVE-2020-0305",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-07-17T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1860065"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way the Linux kernel\u0027s filesystem subsystem handled a race condition in the chrdev_open function. This flaw allows a privileged local user to starve the resources, causing a denial of service or potentially escalating their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (elevated/root privileges).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "RHBZ#1860065",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0305",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079"
        }
      ],
      "release_date": "2020-07-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c"
    },
    {
      "cve": "CVE-2020-0444",
      "cwe": {
        "id": "CWE-244",
        "name": "Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)"
      },
      "discovery_date": "2021-01-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1920474"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A logic error in audit_data_to_entry can lead to a local escalation of privilege without user interaction needed. A local attacker with special user privilege could crash the system leading to information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: bad kfree in auditfilter.c may lead to escalation of privilege",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-0444"
        },
        {
          "category": "external",
          "summary": "RHBZ#1920474",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920474"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0444",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-0444"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0444",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0444"
        }
      ],
      "release_date": "2021-01-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: bad kfree in auditfilter.c may lead to escalation of privilege"
    },
    {
      "cve": "CVE-2020-8647",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802563"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s virtual console resize functionality. An attacker with local access to virtual consoles can use the virtual console resizing code to gather kernel internal data structures.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having Moderate impact because the information leak is limited.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802563",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8647",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "The attack vector can be significantly reduced by preventing users from being able to log into the local virtual console.\n\nSee the instructions on disabling local login here: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/managing_smart_cards/pam_configuration_files , See the section on \"pam_console\" to deny users logging into the console.  This mechanism should work from el6 forward to current versions of Red Hat Enterprise Linux.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c"
    },
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2020-8649",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802555"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console. An out-of-bounds read can occur, leaking information to the console.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a having Moderate impact, it is an infoleak that is written to the screen.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802555",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8649",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c"
    },
    {
      "cve": "CVE-2020-10732",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "discovery_date": "2020-05-05T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1831399"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: uninitialized kernel data leak in userspace coredumps",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "RHBZ#1831399",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10732",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732"
        }
      ],
      "release_date": "2020-05-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Possible mitigation would be to disable core dumps system-wide by setting:\n\n* hard core 0\n\nIn the  /etc/security/limits.conf file and restarting applications/services/processes which users may have access to or simply reboot the system.  This disables core dumps which may not be a suitable workaround in your environment.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: uninitialized kernel data leak in userspace coredumps"
    },
    {
      "cve": "CVE-2020-10751",
      "cwe": {
        "id": "CWE-349",
        "name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
      },
      "discovery_date": "2020-05-25T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1839634"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SELinux netlink permission check bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "RHBZ#1839634",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10751",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/",
          "url": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2020/04/30/5",
          "url": "https://www.openwall.com/lists/oss-security/2020/04/30/5"
        }
      ],
      "release_date": "2020-04-27T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SELinux netlink permission check bypass"
    },
    {
      "cve": "CVE-2020-10773",
      "cwe": {
        "id": "CWE-626",
        "name": "Null Byte Interaction Error (Poison Null Byte)"
      },
      "discovery_date": "2019-10-28T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1846380"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u2019s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: kernel stack information leak on s390/s390x",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of being limited to only s390 architecture and very limited kernel stack exposure.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10773"
        },
        {
          "category": "external",
          "summary": "RHBZ#1846380",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846380"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10773",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10773"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10773",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10773"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f"
        }
      ],
      "release_date": "2019-10-28T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: kernel stack information leak on s390/s390x"
    },
    {
      "cve": "CVE-2020-10774",
      "cwe": {
        "id": "CWE-909",
        "name": "Missing Initialization of Resource"
      },
      "discovery_date": "2020-06-02T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1846964"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw memory disclosure flaw was found in the Linux kernel\u2019s sysctl subsystem in reading the /proc/sys/kernel/rh_features file. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the limited and random (non-controllable by attacker) memory disclosure.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10774"
        },
        {
          "category": "external",
          "summary": "RHBZ#1846964",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10774",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10774"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774"
        }
      ],
      "release_date": "2020-06-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features"
    },
    {
      "cve": "CVE-2020-10942",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2020-03-24T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1817718"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow issue was found in the get_raw_socket() routine of the Host kernel accelerator for virtio net (vhost-net) driver. It could occur while doing an ictol(VHOST_NET_SET_BACKEND) call, and retrieving socket name in a kernel stack variable via get_raw_socket(). A user able to perform ioctl(2) calls on the \u0027/dev/vhost-net\u0027 device may use this flaw to crash the kernel resulting in DoS issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the kernel package as shipped with the Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\nThis issue affects the kernel package as shipped with the Red Hat Enterprise Linux 6, 7 and 8. Future kernel updates for Red Hat Enterprise Linux 6, 7 and 8 may address this issue.\n\nIt is rated to have Low impact because it is quite difficult/unlikely to be triggered by a guest (or even host) user. In case it does happen, like in the upstream report, the stack overflow shall hit the stack canaries, resulting in DoS by crashing the kernel.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "RHBZ#1817718",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10942",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942"
        }
      ],
      "release_date": "2020-03-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field"
    },
    {
      "cve": "CVE-2020-11565",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-04-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824918"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel. An empty nodelist in mempolicy.c is mishandled durig mount option parsing leading to a stack-based out-of-bounds write. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-11565"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824918",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11565",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565"
        }
      ],
      "release_date": "2020-04-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c"
    },
    {
      "cve": "CVE-2020-11668",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2020-04-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824792"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824792",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668"
        }
      ],
      "release_date": "2020-01-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c"
    },
    {
      "cve": "CVE-2020-12465",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2020-04-29T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1831699"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory overflow and data corruption flaw were found in the Mediatek MT76 driver module for WiFi in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c. An oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with a special user or root privileges can cause a denial of service or a leak of internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12465"
        },
        {
          "category": "external",
          "summary": "RHBZ#1831699",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831699"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12465",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12465"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12465",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12465"
        }
      ],
      "release_date": "2020-03-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is to skip loading the affected module mt76 onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c"
    },
    {
      "cve": "CVE-2020-12655",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2020-05-05T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1832543"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger it (administrative account or physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "RHBZ#1832543",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12655",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655"
        }
      ],
      "release_date": "2020-03-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "This flaw requires an attacker being able to have the system mount a crafted filesystem.\n\nIf the xfs filesystem is not in use, the \u0027xfs\u0027 kernel module can be blacklisted and the module\nwill not be loaded when the filesystem is mounted, mounting will fail.\n\nHowever, if this filesystem is in use, this workaround will not be suitable.\n\nTo find out how to blacklist the \"xfs\" kernel module please see https://access.redhat.com/solutions/41278 or contact Red hat Global Support services",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata"
    },
    {
      "cve": "CVE-2020-12659",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-05-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1832876"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds (OOB) memory access flaw was found in the Network XDP (the eXpress Data Path) module in the Linux kernel\u0027s xdp_umem_reg function in net/xdp/xdp_umem.c. When a user with special user privilege of CAP_NET_ADMIN (or root) calls setsockopt to register umem ring on XDP socket, passing the headroom value larger than the available space in the chunk, it leads to an out-of-bounds write, causing panic or possible memory corruption. This flaw may lead to privilege escalation if a local end-user is granted permission to influence the execution of code in this manner.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12659"
        },
        {
          "category": "external",
          "summary": "RHBZ#1832876",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12659",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12659"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659"
        }
      ],
      "release_date": "2020-05-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption"
    },
    {
      "cve": "CVE-2020-12770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-05-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1834845"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in sg_write in drivers/scsi/sg.c in the SCSI generic (sg) driver subsystem. This flaw allows an attacker with local access and special user or root privileges to cause a denial of service if the allocated list is not cleaned with an invalid (Sg_fd * sfp) pointer at the time of failure, also possibly causing a kernel internal information leak problem.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "RHBZ#1834845",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770"
        }
      ],
      "release_date": "2020-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Adam Zabrocki"
          ]
        }
      ],
      "cve": "CVE-2020-12826",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "discovery_date": "2020-03-27T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1822077"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers.  A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "RHBZ#1822077",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12826",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da"
        },
        {
          "category": "external",
          "summary": "https://lists.openwall.net/linux-kernel/2020/03/24/1803",
          "url": "https://lists.openwall.net/linux-kernel/2020/03/24/1803"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1",
          "url": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1"
        }
      ],
      "release_date": "2020-05-12T05:40:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Rakesh Rakesh"
          ],
          "organization": "Netezza Support"
        }
      ],
      "cve": "CVE-2020-14381",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-09-01T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1874311"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "RHBZ#1874311",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14381",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254"
        }
      ],
      "release_date": "2020-05-07T19:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF"
    },
    {
      "cve": "CVE-2020-25641",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2020-09-17T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1881424"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of biovecs. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "RHBZ#1881424",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25641",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124"
        },
        {
          "category": "external",
          "summary": "https://www.kernel.org/doc/html/latest/block/biovecs.html",
          "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html"
        }
      ],
      "release_date": "2020-09-30T00:24:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Zhenpeng Lin"
          ]
        }
      ],
      "cve": "CVE-2021-3715",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-08-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1993988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "RHBZ#1993988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
        }
      ],
      "release_date": "2021-09-07T08:25:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
    },
    {
      "cve": "CVE-2022-50219",
      "discovery_date": "2025-06-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2373517"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix KASAN use-after-free Read in compute_effective_progs\n\nSyzbot found a Use After Free bug in compute_effective_progs().\nThe reproducer creates a number of BPF links, and causes a fault\ninjected alloc to fail, while calling bpf_link_detach on them.\nLink detach triggers the link to be freed by bpf_link_free(),\nwhich calls __cgroup_bpf_detach() and update_effective_progs().\nIf the memory allocation in this function fails, the function restores\nthe pointer to the bpf_cgroup_link on the cgroup list, but the memory\ngets freed just after it returns. After this, every subsequent call to\nupdate_effective_progs() causes this already deallocated pointer to be\ndereferenced in prog_list_length(), and triggers KASAN UAF error.\n\nTo fix this issue don\u0027t preserve the pointer to the prog or link in the\nlist, but remove it and replace it with a dummy prog without shrinking\nthe table. The subsequent call to __cgroup_bpf_detach() or\n__cgroup_bpf_detach() will correct it.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: bpf: Fix KASAN use-after-free Read in compute_effective_progs",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-50219"
        },
        {
          "category": "external",
          "summary": "RHBZ#2373517",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373517"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-50219",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-50219"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50219",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50219"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2025061846-CVE-2022-50219-a138@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2025061846-CVE-2022-50219-a138@gregkh/T"
        }
      ],
      "release_date": "2025-06-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: bpf: Fix KASAN use-after-free Read in compute_effective_progs"
    },
    {
      "cve": "CVE-2025-21727",
      "cwe": {
        "id": "CWE-820",
        "name": "Missing Synchronization"
      },
      "discovery_date": "2025-02-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2348516"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: fix UAF in padata_reorder\n\nA bug was found when run ltp test:\n\nBUG: KASAN: slab-use-after-free in padata_find_next+0x29/0x1a0\nRead of size 4 at addr ffff88bbfe003524 by task kworker/u113:2/3039206\n\nCPU: 0 PID: 3039206 Comm: kworker/u113:2 Kdump: loaded Not tainted 6.6.0+\nWorkqueue: pdecrypt_parallel padata_parallel_worker\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x32/0x50\nprint_address_description.constprop.0+0x6b/0x3d0\nprint_report+0xdd/0x2c0\nkasan_report+0xa5/0xd0\npadata_find_next+0x29/0x1a0\npadata_reorder+0x131/0x220\npadata_parallel_worker+0x3d/0xc0\nprocess_one_work+0x2ec/0x5a0\n\nIf \u0027mdelay(10)\u0027 is added before calling \u0027padata_find_next\u0027 in the\n\u0027padata_reorder\u0027 function, this issue could be reproduced easily with\nltp test (pcrypt_aead01).\n\nThis can be explained as bellow:\n\npcrypt_aead_encrypt\n...\npadata_do_parallel\nrefcount_inc(\u0026pd-\u003erefcnt); // add refcnt\n...\npadata_do_serial\npadata_reorder // pd\nwhile (1) {\npadata_find_next(pd, true); // using pd\nqueue_work_on\n...\npadata_serial_worker\t\t\t\tcrypto_del_alg\npadata_put_pd_cnt // sub refcnt\n\t\t\t\t\t\tpadata_free_shell\n\t\t\t\t\t\tpadata_put_pd(ps-\u003epd);\n\t\t\t\t\t\t// pd is freed\n// loop again, but pd is freed\n// call padata_find_next, UAF\n}\n\nIn the padata_reorder function, when it loops in \u0027while\u0027, if the alg is\ndeleted, the refcnt may be decreased to 0 before entering\n\u0027padata_find_next\u0027, which leads to UAF.\n\nAs mentioned in [1], do_serial is supposed to be called with BHs disabled\nand always happen under RCU protection, to address this issue, add\nsynchronize_rcu() in \u0027padata_free_shell\u0027 wait for all _do_serial calls\nto finish.\n\n[1] https://lore.kernel.org/all/20221028160401.cccypv4euxikusiq@parnassus.localdomain/\n[2] https://lore.kernel.org/linux-kernel/jfjz5d7zwbytztackem7ibzalm5lnxldi2eofeiczqmqs2m7o6@fq426cwnjtkm/",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: padata: fix UAF in padata_reorder",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21727"
        },
        {
          "category": "external",
          "summary": "RHBZ#2348516",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348516"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21727",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21727",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21727"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21727-b034@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21727-b034@gregkh/T"
        }
      ],
      "release_date": "2025-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: padata: fix UAF in padata_reorder"
    }
  ]
}
  rhsa-2020_4609
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)\n\n* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)\n\n* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)\n\n* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)\n\n* kernel: Denial Of Service in the __ipmi_bmc_register()  (CVE-2019-19046)\n\n* kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c (CVE-2019-19319)\n\n* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)\n\n* kernel: use-after-free in ext4_put_super (CVE-2019-19447)\n\n* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)\n\n* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)\n\n* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)\n\n* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)\n\n* kernel: use-after-free in debugfs_remove (CVE-2019-19770)\n\n* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)\n\n* kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c (CVE-2020-0305)\n\n* kernel: out-of-bounds read in in vc_do_resize (CVE-2020-8647)\n\n* kernel: use-after-free in n_tty_receive_buf_common (CVE-2020-8648)\n\n* kernel: invalid read location in vgacon_invert_region (CVE-2020-8649)\n\n* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)\n\n* kernel: SELinux netlink permission check bypass (CVE-2020-10751)\n\n* kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c (CVE-2020-11565)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: out-of-bounds write in xdp_umem_reg (CVE-2020-12659)\n\n* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)\n\n* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)\n\n* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\n* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)\n\n* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)\n\n* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)\n\n* kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c (CVE-2019-18809)\n\n* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() (CVE-2019-19056)\n\n* kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS (CVE-2019-19062)\n\n* kernel: Two memory leaks in the rtl_usb_probe() (CVE-2019-19063)\n\n* kernel: A memory leak in the rtl8xxxu_submit_int_urb() (CVE-2019-19068)\n\n* kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS (CVE-2019-19072)\n\n* kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)\n\n* kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c (CVE-2019-20054)\n\n* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)\n\n* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)\n\n* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:4609",
        "url": "https://access.redhat.com/errata/RHSA-2020:4609"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index"
      },
      {
        "category": "external",
        "summary": "1733495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733495"
      },
      {
        "category": "external",
        "summary": "1759052",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052"
      },
      {
        "category": "external",
        "summary": "1760100",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100"
      },
      {
        "category": "external",
        "summary": "1760310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310"
      },
      {
        "category": "external",
        "summary": "1760420",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420"
      },
      {
        "category": "external",
        "summary": "1774946",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946"
      },
      {
        "category": "external",
        "summary": "1774963",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963"
      },
      {
        "category": "external",
        "summary": "1774988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988"
      },
      {
        "category": "external",
        "summary": "1775015",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015"
      },
      {
        "category": "external",
        "summary": "1775021",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021"
      },
      {
        "category": "external",
        "summary": "1775097",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097"
      },
      {
        "category": "external",
        "summary": "1777418",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418"
      },
      {
        "category": "external",
        "summary": "1777449",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449"
      },
      {
        "category": "external",
        "summary": "1779046",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779046"
      },
      {
        "category": "external",
        "summary": "1779594",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594"
      },
      {
        "category": "external",
        "summary": "1781679",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679"
      },
      {
        "category": "external",
        "summary": "1781810",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810"
      },
      {
        "category": "external",
        "summary": "1783459",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459"
      },
      {
        "category": "external",
        "summary": "1783534",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534"
      },
      {
        "category": "external",
        "summary": "1783561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561"
      },
      {
        "category": "external",
        "summary": "1784130",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130"
      },
      {
        "category": "external",
        "summary": "1786160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160"
      },
      {
        "category": "external",
        "summary": "1786179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179"
      },
      {
        "category": "external",
        "summary": "1790063",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063"
      },
      {
        "category": "external",
        "summary": "1802555",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1802563",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563"
      },
      {
        "category": "external",
        "summary": "1817718",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718"
      },
      {
        "category": "external",
        "summary": "1819377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377"
      },
      {
        "category": "external",
        "summary": "1819399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399"
      },
      {
        "category": "external",
        "summary": "1822077",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077"
      },
      {
        "category": "external",
        "summary": "1824059",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059"
      },
      {
        "category": "external",
        "summary": "1824792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
      },
      {
        "category": "external",
        "summary": "1824918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918"
      },
      {
        "category": "external",
        "summary": "1831399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399"
      },
      {
        "category": "external",
        "summary": "1832543",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543"
      },
      {
        "category": "external",
        "summary": "1832876",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876"
      },
      {
        "category": "external",
        "summary": "1833196",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833196"
      },
      {
        "category": "external",
        "summary": "1834845",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845"
      },
      {
        "category": "external",
        "summary": "1839634",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634"
      },
      {
        "category": "external",
        "summary": "1843410",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843410"
      },
      {
        "category": "external",
        "summary": "1846964",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964"
      },
      {
        "category": "external",
        "summary": "1852298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852298"
      },
      {
        "category": "external",
        "summary": "1859590",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859590"
      },
      {
        "category": "external",
        "summary": "1860065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065"
      },
      {
        "category": "external",
        "summary": "1874311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311"
      },
      {
        "category": "external",
        "summary": "1881424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4609.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-15T10:35:28+00:00",
      "generator": {
        "date": "2024-11-15T10:35:28+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2020:4609",
      "initial_release_date": "2020-11-04T01:14:17+00:00",
      "revision_history": [
        {
          "date": "2020-11-04T01:14:17+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-11-04T01:14:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T10:35:28+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                  "product_id": "NFV-8.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                  "product_id": "RT-8.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
                "product": {
                  "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
                  "product_id": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-240.rt7.54.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-9455",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-09-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1819399"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s video driver. A kernel pointer lead, due to a WARN_ON statement could lead to a local information disclosure with system execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is marked as having Low impact because the information leak is very subtle and can be only used to break KASLR and not provide access to kernel memory content.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "RHBZ#1819399",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9455",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455"
        }
      ],
      "release_date": "2019-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure"
    },
    {
      "cve": "CVE-2019-9458",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-09-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1819377"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s video driver. A race condition, leading to a use-after-free, could lead to a local privilege escalation. User interaction is not needed for exploitation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use after free due to race condition in the video driver leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact, because of the need of additional privileges (usually local console user) to access the video device driver.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "RHBZ#1819377",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458"
        }
      ],
      "release_date": "2019-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent modules v4l2-common, v4l2-dv-timings from being loaded if not being used for primary display. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use after free due to race condition in the video driver leads to local privilege escalation"
    },
    {
      "cve": "CVE-2019-15917",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-10-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760100"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of the HCI UART driver. A local attacker with access permissions to the Bluetooth device can issue an ioctl, which triggers the hci_uart_set_proto() function in drivers/bluetooth/hci_ldisc.c. The flaw in this function can cause memory corruption or a denial of service because of a use-after-free issue when the hci_uart_register_dev() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a Moderate as it requires the local attacker to have permissions to issue ioctl commands to the bluetooth device and bluetooth hardware to be present.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15917"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760100",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15917",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module hci_uart from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c"
    },
    {
      "cve": "CVE-2019-15925",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-09-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1759052"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds access flaw was found in the hclge_shaper_para_calc driver in the Linux kernel. Access to an array with an index higher than its maximum index will lead to an out-of-bounds access vulnerability. This could affect both data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15925"
        },
        {
          "category": "external",
          "summary": "RHBZ#1759052",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15925",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15925"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Blacklisting the affected HCLGE driver module until a patch is available can be done using the blacklist mechanism. This will ensure the driver is not loaded at boot time.  For instructions on how to black list a kernel module, please read: https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg"
    },
    {
      "cve": "CVE-2019-16231",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the FUJITSU Extended Socket Network driver. A call to the alloc_workqueue return was not validated and causes a denial of service at the time of failure. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16231",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2019/9/9/487",
          "url": "https://lkml.org/lkml/2019/9/9/487"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20191004-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20191004-0001/"
        }
      ],
      "release_date": "2019-09-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c"
    },
    {
      "cve": "CVE-2019-16233",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760420"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the QLOGIC drivers for HBA. A call to alloc_workqueue return was not validated and can cause a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760420",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16233",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2019/9/9/487",
          "url": "https://lkml.org/lkml/2019/9/9/487"
        }
      ],
      "release_date": "2019-09-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c"
    },
    {
      "cve": "CVE-2019-18808",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1777418"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the AMD Cryptographic Co-processor driver in the Linux kernel. An attacker, able to send invalid SHA type commands, could cause the system to crash. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because it affects only specific hardware enabled systems.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "RHBZ#1777418",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18808",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808"
        }
      ],
      "release_date": "2019-11-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module ccp. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c"
    },
    {
      "cve": "CVE-2019-18809",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-10-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1777449"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Afatech 9005 DVB-T receiver driver in the Linux kernel. An attacker, with physical access to the system, could cause the system to crash following a resource cleanup. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-18809"
        },
        {
          "category": "external",
          "summary": "RHBZ#1777449",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18809",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-18809"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809"
        }
      ],
      "release_date": "2019-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module dvb-usb-af9005. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c"
    },
    {
      "cve": "CVE-2019-19046",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak problem was found in __ipmi_bmc_register in drivers/char/ipmi/ipmi_msghandler.c in Intelligent Platform Management Interface (IPMI) which is used for incoming and outgoing message routing purpose. This flaw may allow an attacker with minimal privilege to cause a denial of service by triggering ida_simple_get() failure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19046"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19046",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046"
        }
      ],
      "release_date": "2019-11-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c"
    },
    {
      "cve": "CVE-2019-19056",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775097"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the mwifiex PCIE driver in the Linux kernel handled resource cleanup on a DMA mapping error. This flaw allows an attacker able to trigger the DMA mapping error to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (DMA mapping error).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19056"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775097",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19056",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19056"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056"
        }
      ],
      "release_date": "2019-10-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex_pcie. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS"
    },
    {
      "cve": "CVE-2019-19062",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775021"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The crypto_report function mishandles resource cleanup on error. A local attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error cleanup code path.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775021",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19062",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module crypto_user. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS"
    },
    {
      "cve": "CVE-2019-19063",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775015"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The rtl_usb_probe function mishandles resource cleanup on error. An attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19063"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775015",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19063",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8192cu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS"
    },
    {
      "cve": "CVE-2019-19068",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774963"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A memory leak in the realtek driver allows an attacker to cause a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (physical access and/or system-wide out-of-memory condition).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19068"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774963",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19068",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19068"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8xxxu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS"
    },
    {
      "cve": "CVE-2019-19072",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774946"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the predicate_parse function in the tracing subsystem of the Linux kernel handled resource cleanup on error. This flaw allows an attacker with the ability to produce the error to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (high privileges).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19072"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774946",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19072",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19072"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS"
    },
    {
      "cve": "CVE-2019-19319",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1784130"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s Ext4 FileSystem in the way it uses a crafted ext4 image. This flaw allows a local user with physical access to crash the system or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (physical access or user interaction to mount the crafted filesystem image).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "RHBZ#1784130",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19319",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319"
        }
      ],
      "release_date": "2019-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c"
    },
    {
      "cve": "CVE-2019-19332",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-12-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1779594"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory write issue was found in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "RHBZ#1779594",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19332",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/",
          "url": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2019/12/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2019/12/16/1"
        }
      ],
      "release_date": "2019-12-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid"
    },
    {
      "cve": "CVE-2019-19447",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781679"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s ext4_unlink function. An attacker could corrupt memory or escalate privileges when deleting a file from a recently unmounted specially crafted ext4 filesystem, including local, USB, and iSCSI.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781679",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19447",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=205433",
          "url": "https://bugzilla.kernel.org/show_bug.cgi?id=205433"
        },
        {
          "category": "external",
          "summary": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447",
          "url": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447"
        }
      ],
      "release_date": "2019-12-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Ext4 filesytems are built into the kernel so it is not possible to prevent the kernel module from loading.  However, this flaw can be prevented by disallowing mounting of untrusted filesystems.\n\nAs mounting is a privileged operation, (except for device hotplug) removing the ability for mounting and unmounting will prevent this flaw from being exploited.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c"
    },
    {
      "cve": "CVE-2019-19524",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783459"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s input device driver functionality when unplugging a device. A user with physical access could use this flaw to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783459",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19524",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524"
        }
      ],
      "release_date": "2019-11-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue for the Red Hat Enterprise Linux 7 or higher version, prevent module ff-memless from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free"
    },
    {
      "cve": "CVE-2019-19533",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783534"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An information leak flaw was found in the Linux kernel\u0027s USB digital video device driver. An attacker with a malicious USB device presenting itself as a \u0027Technotrend/Hauppauge USB DEC\u0027 device is able to issue commands to this specific device and leak kernel internal memory information.  The highest threat from this vulnerability is a breach of data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783534",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19533",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533"
        }
      ],
      "release_date": "2019-08-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "As the ttusb_dec module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install ttusb_dec /bin/true\" \u003e\u003e /etc/modprobe.d/disable-cifs.conf \n \nThe system will need to be restarted if the ttusb_dec module is already loaded. In most circumstances, the CIFS kernel module will be unable to be unloaded while the device is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c"
    },
    {
      "cve": "CVE-2019-19537",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2019-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783561"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel, where there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer. An attacker who can hotplug at least two devices of this class can cause a use-after-free situation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition caused by a malicious USB device in the USB character device driver layer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783561",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537"
        }
      ],
      "release_date": "2019-08-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Many Character devices can trigger this flaw as they leverage the lower levels of the USB subsystem.\n\nThe safest method that I have found would be to disable USB ports that are able to be attacked\nusing this method, disable them first by disallowing them from waking up from low-power states \nwith the command (Replace X with the port number available).\n\necho disabled \u003e\u003e /sys/bus/usb/devices/usbX/power/wakeup \n\nThe system must also disable the specific ports power after with the command:\n\necho suspend | sudo tee /sys/bus/usb/devices/usbX/power/level\n\nThis change not persist through system reboots and must be applied at each reboot to be effective.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition caused by a malicious USB device in the USB character device driver layer"
    },
    {
      "cve": "CVE-2019-19543",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781810"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s infrared serial module. An attacker could use this flaw to corrupt memory and possibly escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781810",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543"
        }
      ],
      "release_date": "2019-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "As the  module will be auto-loaded when the relevant hardware is required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install serial_ir  /bin/true\" \u003e\u003e /etc/modprobe.d/disable-serial-ir.conf \n \nThe system will need to be restarted if the CIFS modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c"
    },
    {
      "cve": "CVE-2019-19767",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1786160"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s ext4 file system functionality when the user mount ext4 partition, with the usage of an additional debug parameter is defining an extra inode size. If this parameter has a non zero value, this flaw allows a local user to crash the system when inode expansion happens.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "RHBZ#1786160",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19767",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767"
        }
      ],
      "release_date": "2019-11-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "The mitigation is not to use debug_want_extra_isize parameter when mounting ext4 FS.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c"
    },
    {
      "cve": "CVE-2019-19770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1786179"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the debugfs_remove function in the Linux kernel. The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal. This vulnerability can lead to a kernel information leak. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "RHBZ#1786179",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770"
        }
      ],
      "release_date": "2019-11-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c"
    },
    {
      "cve": "CVE-2019-20054",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2019-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1790063"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of dropping sysctl entries. A local attacker who has access to load modules on the system can trigger a condition during module load failure and panic the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "RHBZ#1790063",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20054",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054"
        }
      ],
      "release_date": "2019-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c"
    },
    {
      "cve": "CVE-2019-20636",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-04-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824059"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel. A crafted keycode table could be used by drivers/input/input.c to perform the out-of-bounds write. A local user with root access can insert garbage to this keycode table that can lead to out-of-bounds memory access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write via crafted keycode table",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue was rated as having Moderate impact because of the need of physical access or administrator privileges to trigger it.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20636"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824059",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20636",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636"
        }
      ],
      "release_date": "2020-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write via crafted keycode table"
    },
    {
      "cve": "CVE-2020-0305",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-07-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1860065"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way the Linux kernel\u0027s filesystem subsystem handled a race condition in the chrdev_open function. This flaw allows a privileged local user to starve the resources, causing a denial of service or potentially escalating their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (elevated/root privileges).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "RHBZ#1860065",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0305",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079"
        }
      ],
      "release_date": "2020-07-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c"
    },
    {
      "cve": "CVE-2020-8647",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802563"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s virtual console resize functionality. An attacker with local access to virtual consoles can use the virtual console resizing code to gather kernel internal data structures.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having Moderate impact because the information leak is limited.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802563",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8647",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "The attack vector can be significantly reduced by preventing users from being able to log into the local virtual console.\n\nSee the instructions on disabling local login here: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/managing_smart_cards/pam_configuration_files , See the section on \"pam_console\" to deny users logging into the console.  This mechanism should work from el6 forward to current versions of Red Hat Enterprise Linux.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c"
    },
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2020-8649",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802555"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console. An out-of-bounds read can occur, leaking information to the console.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a having Moderate impact, it is an infoleak that is written to the screen.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802555",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8649",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c"
    },
    {
      "cve": "CVE-2020-10732",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "discovery_date": "2020-05-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1831399"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: uninitialized kernel data leak in userspace coredumps",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "RHBZ#1831399",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10732",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732"
        }
      ],
      "release_date": "2020-05-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Possible mitigation would be to disable core dumps system-wide by setting:\n\n* hard core 0\n\nIn the  /etc/security/limits.conf file and restarting applications/services/processes which users may have access to or simply reboot the system.  This disables core dumps which may not be a suitable workaround in your environment.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: uninitialized kernel data leak in userspace coredumps"
    },
    {
      "cve": "CVE-2020-10751",
      "cwe": {
        "id": "CWE-349",
        "name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
      },
      "discovery_date": "2020-05-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1839634"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SELinux netlink permission check bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "RHBZ#1839634",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10751",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/",
          "url": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2020/04/30/5",
          "url": "https://www.openwall.com/lists/oss-security/2020/04/30/5"
        }
      ],
      "release_date": "2020-04-27T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SELinux netlink permission check bypass"
    },
    {
      "cve": "CVE-2020-10774",
      "cwe": {
        "id": "CWE-909",
        "name": "Missing Initialization of Resource"
      },
      "discovery_date": "2020-06-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1846964"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw memory disclosure flaw was found in the Linux kernel\u2019s sysctl subsystem in reading the /proc/sys/kernel/rh_features file. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the limited and random (non-controllable by attacker) memory disclosure.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10774"
        },
        {
          "category": "external",
          "summary": "RHBZ#1846964",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10774",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10774"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774"
        }
      ],
      "release_date": "2020-06-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features"
    },
    {
      "cve": "CVE-2020-10942",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2020-03-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1817718"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow issue was found in the get_raw_socket() routine of the Host kernel accelerator for virtio net (vhost-net) driver. It could occur while doing an ictol(VHOST_NET_SET_BACKEND) call, and retrieving socket name in a kernel stack variable via get_raw_socket(). A user able to perform ioctl(2) calls on the \u0027/dev/vhost-net\u0027 device may use this flaw to crash the kernel resulting in DoS issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the kernel package as shipped with the Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\nThis issue affects the kernel package as shipped with the Red Hat Enterprise Linux 6, 7 and 8. Future kernel updates for Red Hat Enterprise Linux 6, 7 and 8 may address this issue.\n\nIt is rated to have Low impact because it is quite difficult/unlikely to be triggered by a guest (or even host) user. In case it does happen, like in the upstream report, the stack overflow shall hit the stack canaries, resulting in DoS by crashing the kernel.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "RHBZ#1817718",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10942",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942"
        }
      ],
      "release_date": "2020-03-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field"
    },
    {
      "cve": "CVE-2020-11565",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-04-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824918"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel. An empty nodelist in mempolicy.c is mishandled durig mount option parsing leading to a stack-based out-of-bounds write. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-11565"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824918",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11565",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565"
        }
      ],
      "release_date": "2020-04-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c"
    },
    {
      "cve": "CVE-2020-11668",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2020-04-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824792"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824792",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668"
        }
      ],
      "release_date": "2020-01-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c"
    },
    {
      "cve": "CVE-2020-12655",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2020-05-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1832543"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger it (administrative account or physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "RHBZ#1832543",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12655",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655"
        }
      ],
      "release_date": "2020-03-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "This flaw requires an attacker being able to have the system mount a crafted filesystem.\n\nIf the xfs filesystem is not in use, the \u0027xfs\u0027 kernel module can be blacklisted and the module\nwill not be loaded when the filesystem is mounted, mounting will fail.\n\nHowever, if this filesystem is in use, this workaround will not be suitable.\n\nTo find out how to blacklist the \"xfs\" kernel module please see https://access.redhat.com/solutions/41278 or contact Red hat Global Support services",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata"
    },
    {
      "cve": "CVE-2020-12659",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-05-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1832876"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds (OOB) memory access flaw was found in the Network XDP (the eXpress Data Path) module in the Linux kernel\u0027s xdp_umem_reg function in net/xdp/xdp_umem.c. When a user with special user privilege of CAP_NET_ADMIN (or root) calls setsockopt to register umem ring on XDP socket, passing the headroom value larger than the available space in the chunk, it leads to an out-of-bounds write, causing panic or possible memory corruption. This flaw may lead to privilege escalation if a local end-user is granted permission to influence the execution of code in this manner.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12659"
        },
        {
          "category": "external",
          "summary": "RHBZ#1832876",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12659",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12659"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659"
        }
      ],
      "release_date": "2020-05-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption"
    },
    {
      "cve": "CVE-2020-12770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-05-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1834845"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in sg_write in drivers/scsi/sg.c in the SCSI generic (sg) driver subsystem. This flaw allows an attacker with local access and special user or root privileges to cause a denial of service if the allocated list is not cleaned with an invalid (Sg_fd * sfp) pointer at the time of failure, also possibly causing a kernel internal information leak problem.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "RHBZ#1834845",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770"
        }
      ],
      "release_date": "2020-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Adam Zabrocki"
          ]
        }
      ],
      "cve": "CVE-2020-12826",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "discovery_date": "2020-03-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1822077"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers.  A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "RHBZ#1822077",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12826",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da"
        },
        {
          "category": "external",
          "summary": "https://lists.openwall.net/linux-kernel/2020/03/24/1803",
          "url": "https://lists.openwall.net/linux-kernel/2020/03/24/1803"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1",
          "url": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1"
        }
      ],
      "release_date": "2020-05-12T05:40:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Rakesh Rakesh"
          ],
          "organization": "Netezza Support"
        }
      ],
      "cve": "CVE-2020-14381",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-09-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1874311"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "RHBZ#1874311",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14381",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254"
        }
      ],
      "release_date": "2020-05-07T19:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF"
    },
    {
      "cve": "CVE-2020-25641",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2020-09-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1881424"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of biovecs. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "RHBZ#1881424",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25641",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124"
        },
        {
          "category": "external",
          "summary": "https://www.kernel.org/doc/html/latest/block/biovecs.html",
          "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html"
        }
      ],
      "release_date": "2020-09-30T00:24:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Zhenpeng Lin"
          ]
        }
      ],
      "cve": "CVE-2021-3715",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-08-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1993988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "RHBZ#1993988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
        }
      ],
      "release_date": "2021-09-07T08:25:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
    }
  ]
}
  rhsa-2020:4609
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)\n\n* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)\n\n* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)\n\n* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)\n\n* kernel: Denial Of Service in the __ipmi_bmc_register()  (CVE-2019-19046)\n\n* kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c (CVE-2019-19319)\n\n* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)\n\n* kernel: use-after-free in ext4_put_super (CVE-2019-19447)\n\n* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)\n\n* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)\n\n* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)\n\n* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)\n\n* kernel: use-after-free in debugfs_remove (CVE-2019-19770)\n\n* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)\n\n* kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c (CVE-2020-0305)\n\n* kernel: out-of-bounds read in in vc_do_resize (CVE-2020-8647)\n\n* kernel: use-after-free in n_tty_receive_buf_common (CVE-2020-8648)\n\n* kernel: invalid read location in vgacon_invert_region (CVE-2020-8649)\n\n* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)\n\n* kernel: SELinux netlink permission check bypass (CVE-2020-10751)\n\n* kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c (CVE-2020-11565)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: out-of-bounds write in xdp_umem_reg (CVE-2020-12659)\n\n* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)\n\n* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)\n\n* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\n* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)\n\n* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)\n\n* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)\n\n* kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c (CVE-2019-18809)\n\n* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() (CVE-2019-19056)\n\n* kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS (CVE-2019-19062)\n\n* kernel: Two memory leaks in the rtl_usb_probe() (CVE-2019-19063)\n\n* kernel: A memory leak in the rtl8xxxu_submit_int_urb() (CVE-2019-19068)\n\n* kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS (CVE-2019-19072)\n\n* kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)\n\n* kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c (CVE-2019-20054)\n\n* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)\n\n* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)\n\n* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:4609",
        "url": "https://access.redhat.com/errata/RHSA-2020:4609"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index"
      },
      {
        "category": "external",
        "summary": "1733495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733495"
      },
      {
        "category": "external",
        "summary": "1759052",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052"
      },
      {
        "category": "external",
        "summary": "1760100",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100"
      },
      {
        "category": "external",
        "summary": "1760310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310"
      },
      {
        "category": "external",
        "summary": "1760420",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420"
      },
      {
        "category": "external",
        "summary": "1774946",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946"
      },
      {
        "category": "external",
        "summary": "1774963",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963"
      },
      {
        "category": "external",
        "summary": "1774988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988"
      },
      {
        "category": "external",
        "summary": "1775015",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015"
      },
      {
        "category": "external",
        "summary": "1775021",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021"
      },
      {
        "category": "external",
        "summary": "1775097",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097"
      },
      {
        "category": "external",
        "summary": "1777418",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418"
      },
      {
        "category": "external",
        "summary": "1777449",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449"
      },
      {
        "category": "external",
        "summary": "1779046",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779046"
      },
      {
        "category": "external",
        "summary": "1779594",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594"
      },
      {
        "category": "external",
        "summary": "1781679",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679"
      },
      {
        "category": "external",
        "summary": "1781810",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810"
      },
      {
        "category": "external",
        "summary": "1783459",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459"
      },
      {
        "category": "external",
        "summary": "1783534",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534"
      },
      {
        "category": "external",
        "summary": "1783561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561"
      },
      {
        "category": "external",
        "summary": "1784130",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130"
      },
      {
        "category": "external",
        "summary": "1786160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160"
      },
      {
        "category": "external",
        "summary": "1786179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179"
      },
      {
        "category": "external",
        "summary": "1790063",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063"
      },
      {
        "category": "external",
        "summary": "1802555",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1802563",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563"
      },
      {
        "category": "external",
        "summary": "1817718",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718"
      },
      {
        "category": "external",
        "summary": "1819377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377"
      },
      {
        "category": "external",
        "summary": "1819399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399"
      },
      {
        "category": "external",
        "summary": "1822077",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077"
      },
      {
        "category": "external",
        "summary": "1824059",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059"
      },
      {
        "category": "external",
        "summary": "1824792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
      },
      {
        "category": "external",
        "summary": "1824918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918"
      },
      {
        "category": "external",
        "summary": "1831399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399"
      },
      {
        "category": "external",
        "summary": "1832543",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543"
      },
      {
        "category": "external",
        "summary": "1832876",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876"
      },
      {
        "category": "external",
        "summary": "1833196",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833196"
      },
      {
        "category": "external",
        "summary": "1834845",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845"
      },
      {
        "category": "external",
        "summary": "1839634",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634"
      },
      {
        "category": "external",
        "summary": "1843410",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843410"
      },
      {
        "category": "external",
        "summary": "1846964",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964"
      },
      {
        "category": "external",
        "summary": "1852298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852298"
      },
      {
        "category": "external",
        "summary": "1859590",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859590"
      },
      {
        "category": "external",
        "summary": "1860065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065"
      },
      {
        "category": "external",
        "summary": "1874311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311"
      },
      {
        "category": "external",
        "summary": "1881424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4609.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T02:11:38+00:00",
      "generator": {
        "date": "2025-10-10T02:11:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2020:4609",
      "initial_release_date": "2020-11-04T01:14:17+00:00",
      "revision_history": [
        {
          "date": "2020-11-04T01:14:17+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-11-04T01:14:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T02:11:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
                  "product_id": "NFV-8.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux Real Time (v. 8)",
                  "product_id": "RT-8.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_id": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-240.rt7.54.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
                "product": {
                  "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
                  "product_id": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-240.rt7.54.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
          "product_id": "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "NFV-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src"
        },
        "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.src",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
          "product_id": "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        },
        "product_reference": "kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
        "relates_to_product_reference": "RT-8.3.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-9455",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-09-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1819399"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s video driver. A kernel pointer lead, due to a WARN_ON statement could lead to a local information disclosure with system execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is marked as having Low impact because the information leak is very subtle and can be only used to break KASLR and not provide access to kernel memory content.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "RHBZ#1819399",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9455",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455"
        }
      ],
      "release_date": "2019-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure"
    },
    {
      "cve": "CVE-2019-9458",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-09-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1819377"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s video driver. A race condition, leading to a use-after-free, could lead to a local privilege escalation. User interaction is not needed for exploitation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use after free due to race condition in the video driver leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact, because of the need of additional privileges (usually local console user) to access the video device driver.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "RHBZ#1819377",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458"
        }
      ],
      "release_date": "2019-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent modules v4l2-common, v4l2-dv-timings from being loaded if not being used for primary display. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use after free due to race condition in the video driver leads to local privilege escalation"
    },
    {
      "cve": "CVE-2019-15917",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-10-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760100"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of the HCI UART driver. A local attacker with access permissions to the Bluetooth device can issue an ioctl, which triggers the hci_uart_set_proto() function in drivers/bluetooth/hci_ldisc.c. The flaw in this function can cause memory corruption or a denial of service because of a use-after-free issue when the hci_uart_register_dev() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a Moderate as it requires the local attacker to have permissions to issue ioctl commands to the bluetooth device and bluetooth hardware to be present.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15917"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760100",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15917",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module hci_uart from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c"
    },
    {
      "cve": "CVE-2019-15925",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-09-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1759052"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds access flaw was found in the hclge_shaper_para_calc driver in the Linux kernel. Access to an array with an index higher than its maximum index will lead to an out-of-bounds access vulnerability. This could affect both data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15925"
        },
        {
          "category": "external",
          "summary": "RHBZ#1759052",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15925",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15925"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Blacklisting the affected HCLGE driver module until a patch is available can be done using the blacklist mechanism. This will ensure the driver is not loaded at boot time.  For instructions on how to black list a kernel module, please read: https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg"
    },
    {
      "cve": "CVE-2019-16231",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the FUJITSU Extended Socket Network driver. A call to the alloc_workqueue return was not validated and causes a denial of service at the time of failure. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16231",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2019/9/9/487",
          "url": "https://lkml.org/lkml/2019/9/9/487"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20191004-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20191004-0001/"
        }
      ],
      "release_date": "2019-09-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c"
    },
    {
      "cve": "CVE-2019-16233",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760420"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the QLOGIC drivers for HBA. A call to alloc_workqueue return was not validated and can cause a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760420",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16233",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2019/9/9/487",
          "url": "https://lkml.org/lkml/2019/9/9/487"
        }
      ],
      "release_date": "2019-09-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c"
    },
    {
      "cve": "CVE-2019-18808",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1777418"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the AMD Cryptographic Co-processor driver in the Linux kernel. An attacker, able to send invalid SHA type commands, could cause the system to crash. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because it affects only specific hardware enabled systems.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "RHBZ#1777418",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18808",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808"
        }
      ],
      "release_date": "2019-11-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module ccp. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c"
    },
    {
      "cve": "CVE-2019-18809",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-10-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1777449"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Afatech 9005 DVB-T receiver driver in the Linux kernel. An attacker, with physical access to the system, could cause the system to crash following a resource cleanup. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-18809"
        },
        {
          "category": "external",
          "summary": "RHBZ#1777449",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18809",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-18809"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809"
        }
      ],
      "release_date": "2019-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module dvb-usb-af9005. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c"
    },
    {
      "cve": "CVE-2019-19046",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak problem was found in __ipmi_bmc_register in drivers/char/ipmi/ipmi_msghandler.c in Intelligent Platform Management Interface (IPMI) which is used for incoming and outgoing message routing purpose. This flaw may allow an attacker with minimal privilege to cause a denial of service by triggering ida_simple_get() failure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19046"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19046",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046"
        }
      ],
      "release_date": "2019-11-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c"
    },
    {
      "cve": "CVE-2019-19056",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775097"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the mwifiex PCIE driver in the Linux kernel handled resource cleanup on a DMA mapping error. This flaw allows an attacker able to trigger the DMA mapping error to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (DMA mapping error).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19056"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775097",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19056",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19056"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056"
        }
      ],
      "release_date": "2019-10-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex_pcie. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS"
    },
    {
      "cve": "CVE-2019-19062",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775021"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The crypto_report function mishandles resource cleanup on error. A local attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error cleanup code path.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775021",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19062",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module crypto_user. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS"
    },
    {
      "cve": "CVE-2019-19063",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775015"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The rtl_usb_probe function mishandles resource cleanup on error. An attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19063"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775015",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19063",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8192cu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS"
    },
    {
      "cve": "CVE-2019-19068",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774963"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A memory leak in the realtek driver allows an attacker to cause a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (physical access and/or system-wide out-of-memory condition).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19068"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774963",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19068",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19068"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8xxxu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS"
    },
    {
      "cve": "CVE-2019-19072",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774946"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the predicate_parse function in the tracing subsystem of the Linux kernel handled resource cleanup on error. This flaw allows an attacker with the ability to produce the error to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (high privileges).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19072"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774946",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19072",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19072"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS"
    },
    {
      "cve": "CVE-2019-19319",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-12-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1784130"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s Ext4 FileSystem in the way it uses a crafted ext4 image. This flaw allows a local user with physical access to crash the system or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (physical access or user interaction to mount the crafted filesystem image).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "RHBZ#1784130",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19319",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319"
        }
      ],
      "release_date": "2019-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c"
    },
    {
      "cve": "CVE-2019-19332",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-12-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1779594"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory write issue was found in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "RHBZ#1779594",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19332",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/",
          "url": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2019/12/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2019/12/16/1"
        }
      ],
      "release_date": "2019-12-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid"
    },
    {
      "cve": "CVE-2019-19447",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781679"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s ext4_unlink function. An attacker could corrupt memory or escalate privileges when deleting a file from a recently unmounted specially crafted ext4 filesystem, including local, USB, and iSCSI.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781679",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19447",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=205433",
          "url": "https://bugzilla.kernel.org/show_bug.cgi?id=205433"
        },
        {
          "category": "external",
          "summary": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447",
          "url": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447"
        }
      ],
      "release_date": "2019-12-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Ext4 filesytems are built into the kernel so it is not possible to prevent the kernel module from loading.  However, this flaw can be prevented by disallowing mounting of untrusted filesystems.\n\nAs mounting is a privileged operation, (except for device hotplug) removing the ability for mounting and unmounting will prevent this flaw from being exploited.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c"
    },
    {
      "cve": "CVE-2019-19524",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783459"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s input device driver functionality when unplugging a device. A user with physical access could use this flaw to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783459",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19524",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524"
        }
      ],
      "release_date": "2019-11-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue for the Red Hat Enterprise Linux 7 or higher version, prevent module ff-memless from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free"
    },
    {
      "cve": "CVE-2019-19533",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783534"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An information leak flaw was found in the Linux kernel\u0027s USB digital video device driver. An attacker with a malicious USB device presenting itself as a \u0027Technotrend/Hauppauge USB DEC\u0027 device is able to issue commands to this specific device and leak kernel internal memory information.  The highest threat from this vulnerability is a breach of data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783534",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19533",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533"
        }
      ],
      "release_date": "2019-08-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "As the ttusb_dec module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install ttusb_dec /bin/true\" \u003e\u003e /etc/modprobe.d/disable-cifs.conf \n \nThe system will need to be restarted if the ttusb_dec module is already loaded. In most circumstances, the CIFS kernel module will be unable to be unloaded while the device is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c"
    },
    {
      "cve": "CVE-2019-19537",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2019-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783561"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel, where there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer. An attacker who can hotplug at least two devices of this class can cause a use-after-free situation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition caused by a malicious USB device in the USB character device driver layer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783561",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537"
        }
      ],
      "release_date": "2019-08-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Many Character devices can trigger this flaw as they leverage the lower levels of the USB subsystem.\n\nThe safest method that I have found would be to disable USB ports that are able to be attacked\nusing this method, disable them first by disallowing them from waking up from low-power states \nwith the command (Replace X with the port number available).\n\necho disabled \u003e\u003e /sys/bus/usb/devices/usbX/power/wakeup \n\nThe system must also disable the specific ports power after with the command:\n\necho suspend | sudo tee /sys/bus/usb/devices/usbX/power/level\n\nThis change not persist through system reboots and must be applied at each reboot to be effective.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition caused by a malicious USB device in the USB character device driver layer"
    },
    {
      "cve": "CVE-2019-19543",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781810"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s infrared serial module. An attacker could use this flaw to corrupt memory and possibly escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781810",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543"
        }
      ],
      "release_date": "2019-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "As the  module will be auto-loaded when the relevant hardware is required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install serial_ir  /bin/true\" \u003e\u003e /etc/modprobe.d/disable-serial-ir.conf \n \nThe system will need to be restarted if the CIFS modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c"
    },
    {
      "cve": "CVE-2019-19767",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1786160"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s ext4 file system functionality when the user mount ext4 partition, with the usage of an additional debug parameter is defining an extra inode size. If this parameter has a non zero value, this flaw allows a local user to crash the system when inode expansion happens.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "RHBZ#1786160",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19767",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767"
        }
      ],
      "release_date": "2019-11-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "The mitigation is not to use debug_want_extra_isize parameter when mounting ext4 FS.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c"
    },
    {
      "cve": "CVE-2019-19770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1786179"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the debugfs_remove function in the Linux kernel. The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal. This vulnerability can lead to a kernel information leak. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "RHBZ#1786179",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770"
        }
      ],
      "release_date": "2019-11-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c"
    },
    {
      "cve": "CVE-2019-20054",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2019-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1790063"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of dropping sysctl entries. A local attacker who has access to load modules on the system can trigger a condition during module load failure and panic the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "RHBZ#1790063",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20054",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054"
        }
      ],
      "release_date": "2019-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c"
    },
    {
      "cve": "CVE-2019-20636",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-04-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824059"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel. A crafted keycode table could be used by drivers/input/input.c to perform the out-of-bounds write. A local user with root access can insert garbage to this keycode table that can lead to out-of-bounds memory access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write via crafted keycode table",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue was rated as having Moderate impact because of the need of physical access or administrator privileges to trigger it.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20636"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824059",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20636",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636"
        }
      ],
      "release_date": "2020-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write via crafted keycode table"
    },
    {
      "cve": "CVE-2020-0305",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-07-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1860065"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way the Linux kernel\u0027s filesystem subsystem handled a race condition in the chrdev_open function. This flaw allows a privileged local user to starve the resources, causing a denial of service or potentially escalating their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (elevated/root privileges).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "RHBZ#1860065",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0305",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079"
        }
      ],
      "release_date": "2020-07-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c"
    },
    {
      "cve": "CVE-2020-8647",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802563"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s virtual console resize functionality. An attacker with local access to virtual consoles can use the virtual console resizing code to gather kernel internal data structures.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having Moderate impact because the information leak is limited.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802563",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8647",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "The attack vector can be significantly reduced by preventing users from being able to log into the local virtual console.\n\nSee the instructions on disabling local login here: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/managing_smart_cards/pam_configuration_files , See the section on \"pam_console\" to deny users logging into the console.  This mechanism should work from el6 forward to current versions of Red Hat Enterprise Linux.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c"
    },
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2020-8649",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802555"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console. An out-of-bounds read can occur, leaking information to the console.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a having Moderate impact, it is an infoleak that is written to the screen.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802555",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8649",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c"
    },
    {
      "cve": "CVE-2020-10732",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "discovery_date": "2020-05-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1831399"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: uninitialized kernel data leak in userspace coredumps",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "RHBZ#1831399",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10732",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732"
        }
      ],
      "release_date": "2020-05-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Possible mitigation would be to disable core dumps system-wide by setting:\n\n* hard core 0\n\nIn the  /etc/security/limits.conf file and restarting applications/services/processes which users may have access to or simply reboot the system.  This disables core dumps which may not be a suitable workaround in your environment.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: uninitialized kernel data leak in userspace coredumps"
    },
    {
      "cve": "CVE-2020-10751",
      "cwe": {
        "id": "CWE-349",
        "name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
      },
      "discovery_date": "2020-05-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1839634"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SELinux netlink permission check bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "RHBZ#1839634",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10751",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/",
          "url": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2020/04/30/5",
          "url": "https://www.openwall.com/lists/oss-security/2020/04/30/5"
        }
      ],
      "release_date": "2020-04-27T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SELinux netlink permission check bypass"
    },
    {
      "cve": "CVE-2020-10774",
      "cwe": {
        "id": "CWE-909",
        "name": "Missing Initialization of Resource"
      },
      "discovery_date": "2020-06-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1846964"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw memory disclosure flaw was found in the Linux kernel\u2019s sysctl subsystem in reading the /proc/sys/kernel/rh_features file. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the limited and random (non-controllable by attacker) memory disclosure.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10774"
        },
        {
          "category": "external",
          "summary": "RHBZ#1846964",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10774",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10774"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774"
        }
      ],
      "release_date": "2020-06-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features"
    },
    {
      "cve": "CVE-2020-10942",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2020-03-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1817718"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow issue was found in the get_raw_socket() routine of the Host kernel accelerator for virtio net (vhost-net) driver. It could occur while doing an ictol(VHOST_NET_SET_BACKEND) call, and retrieving socket name in a kernel stack variable via get_raw_socket(). A user able to perform ioctl(2) calls on the \u0027/dev/vhost-net\u0027 device may use this flaw to crash the kernel resulting in DoS issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the kernel package as shipped with the Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\nThis issue affects the kernel package as shipped with the Red Hat Enterprise Linux 6, 7 and 8. Future kernel updates for Red Hat Enterprise Linux 6, 7 and 8 may address this issue.\n\nIt is rated to have Low impact because it is quite difficult/unlikely to be triggered by a guest (or even host) user. In case it does happen, like in the upstream report, the stack overflow shall hit the stack canaries, resulting in DoS by crashing the kernel.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "RHBZ#1817718",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10942",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942"
        }
      ],
      "release_date": "2020-03-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field"
    },
    {
      "cve": "CVE-2020-11565",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-04-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824918"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel. An empty nodelist in mempolicy.c is mishandled durig mount option parsing leading to a stack-based out-of-bounds write. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-11565"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824918",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11565",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565"
        }
      ],
      "release_date": "2020-04-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c"
    },
    {
      "cve": "CVE-2020-11668",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2020-04-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824792"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824792",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668"
        }
      ],
      "release_date": "2020-01-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c"
    },
    {
      "cve": "CVE-2020-12655",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2020-05-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1832543"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger it (administrative account or physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "RHBZ#1832543",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12655",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655"
        }
      ],
      "release_date": "2020-03-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "This flaw requires an attacker being able to have the system mount a crafted filesystem.\n\nIf the xfs filesystem is not in use, the \u0027xfs\u0027 kernel module can be blacklisted and the module\nwill not be loaded when the filesystem is mounted, mounting will fail.\n\nHowever, if this filesystem is in use, this workaround will not be suitable.\n\nTo find out how to blacklist the \"xfs\" kernel module please see https://access.redhat.com/solutions/41278 or contact Red hat Global Support services",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata"
    },
    {
      "cve": "CVE-2020-12659",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-05-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1832876"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds (OOB) memory access flaw was found in the Network XDP (the eXpress Data Path) module in the Linux kernel\u0027s xdp_umem_reg function in net/xdp/xdp_umem.c. When a user with special user privilege of CAP_NET_ADMIN (or root) calls setsockopt to register umem ring on XDP socket, passing the headroom value larger than the available space in the chunk, it leads to an out-of-bounds write, causing panic or possible memory corruption. This flaw may lead to privilege escalation if a local end-user is granted permission to influence the execution of code in this manner.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12659"
        },
        {
          "category": "external",
          "summary": "RHBZ#1832876",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12659",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12659"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659"
        }
      ],
      "release_date": "2020-05-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption"
    },
    {
      "cve": "CVE-2020-12770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-05-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1834845"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in sg_write in drivers/scsi/sg.c in the SCSI generic (sg) driver subsystem. This flaw allows an attacker with local access and special user or root privileges to cause a denial of service if the allocated list is not cleaned with an invalid (Sg_fd * sfp) pointer at the time of failure, also possibly causing a kernel internal information leak problem.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "RHBZ#1834845",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770"
        }
      ],
      "release_date": "2020-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Adam Zabrocki"
          ]
        }
      ],
      "cve": "CVE-2020-12826",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "discovery_date": "2020-03-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1822077"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers.  A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "RHBZ#1822077",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12826",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da"
        },
        {
          "category": "external",
          "summary": "https://lists.openwall.net/linux-kernel/2020/03/24/1803",
          "url": "https://lists.openwall.net/linux-kernel/2020/03/24/1803"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1",
          "url": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1"
        }
      ],
      "release_date": "2020-05-12T05:40:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Rakesh Rakesh"
          ],
          "organization": "Netezza Support"
        }
      ],
      "cve": "CVE-2020-14381",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-09-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1874311"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "RHBZ#1874311",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14381",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254"
        }
      ],
      "release_date": "2020-05-07T19:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF"
    },
    {
      "cve": "CVE-2020-25641",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2020-09-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1881424"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of biovecs. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "RHBZ#1881424",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25641",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124"
        },
        {
          "category": "external",
          "summary": "https://www.kernel.org/doc/html/latest/block/biovecs.html",
          "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html"
        }
      ],
      "release_date": "2020-09-30T00:24:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Zhenpeng Lin"
          ]
        }
      ],
      "cve": "CVE-2021-3715",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-08-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1993988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
          "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
          "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "RHBZ#1993988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
        }
      ],
      "release_date": "2021-09-07T08:25:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T01:14:17+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4609"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
          "product_ids": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "NFV-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "NFV-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.src",
            "RT-8.3.0.GA:kernel-rt-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-core-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-devel-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-kvm-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-0:4.18.0-240.rt7.54.el8.x86_64",
            "RT-8.3.0.GA:kernel-rt-modules-extra-0:4.18.0-240.rt7.54.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
    }
  ]
}
  rhsa-2020_4431
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use after free in the video driver leads to local privilege escalation (CVE-2019-9458)\n\n* kernel: use-after-free in drivers/bluetooth/hci_ldisc.c (CVE-2019-15917)\n\n* kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg (CVE-2019-15925)\n\n* kernel: memory leak in ccp_run_sha_cmd() (CVE-2019-18808)\n\n* kernel: Denial Of Service in the __ipmi_bmc_register() (CVE-2019-19046)\n\n* kernel: out-of-bounds write in ext4_xattr_set_entry (CVE-2019-19319)\n\n* Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid (CVE-2019-19332)\n\n* kernel: use-after-free in ext4_put_super (CVE-2019-19447)\n\n* kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free (CVE-2019-19524)\n\n* kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)\n\n* kernel: use-after-free in serial_ir_init_module() (CVE-2019-19543)\n\n* kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry (CVE-2019-19767)\n\n* kernel: use-after-free in debugfs_remove (CVE-2019-19770)\n\n* kernel: out-of-bounds write via crafted keycode table (CVE-2019-20636)\n\n* kernel: possible use-after-free due to a race condition in cdev_get  (CVE-2020-0305)\n\n* kernel: out-of-bounds read in in vc_do_resize function (CVE-2020-8647)\n\n* kernel: use-after-free in n_tty_receive_buf_common function (CVE-2020-8648)\n\n* kernel: invalid read location in vgacon_invert_region function (CVE-2020-8649)\n\n* kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)\n\n* kernel: SELinux netlink permission check bypass (CVE-2020-10751)\n\n* kernel: out-of-bounds write in mpol_parse_str  (CVE-2020-11565)\n\n* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668)\n\n* kernel: buffer overflow in mt76_add_fragment function (CVE-2020-12465)\n\n* kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption (CVE-2020-12659)\n\n* kernel: sg_write function lacks an sg_remove_request call in a certain failure case (CVE-2020-12770)\n\n* kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)\n\n* kernel: referencing inode of removed superblock in get_futex_key() causes UAF (CVE-2020-14381)\n\n* kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS (CVE-2020-25641)\n\n* kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure (CVE-2019-9455)\n\n* kernel: null pointer dereference in dlpar_parse_cc_property  (CVE-2019-12614)\n\n* kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c (CVE-2019-16231)\n\n* kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c (CVE-2019-16233)\n\n* kernel: memory leak in  af9005_identify_state() function (CVE-2019-18809)\n\n* kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function (CVE-2019-19056)\n\n* kernel: memory leak in the crypto_report() function (CVE-2019-19062)\n\n* kernel: Two memory leaks in the rtl_usb_probe() function (CVE-2019-19063)\n\n* kernel: A memory leak in the rtl8xxxu_submit_int_urb() function (CVE-2019-19068)\n\n* kernel: A memory leak in the predicate_parse() function (CVE-2019-19072)\n\n* kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c (CVE-2019-19533)\n\n* kernel: Null pointer dereference in drop_sysctl_table() (CVE-2019-20054)\n\n* kernel: kernel stack information leak on s390/s390x (CVE-2020-10773)\n\n* kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features (CVE-2020-10774)\n\n* kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field (CVE-2020-10942)\n\n* kernel: sync of excessive duration via an XFS v5 image with crafted metadata (CVE-2020-12655)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2020:4431",
        "url": "https://access.redhat.com/errata/RHSA-2020:4431"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index"
      },
      {
        "category": "external",
        "summary": "1660798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660798"
      },
      {
        "category": "external",
        "summary": "1718176",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718176"
      },
      {
        "category": "external",
        "summary": "1759052",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052"
      },
      {
        "category": "external",
        "summary": "1760100",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100"
      },
      {
        "category": "external",
        "summary": "1760310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310"
      },
      {
        "category": "external",
        "summary": "1760420",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420"
      },
      {
        "category": "external",
        "summary": "1774946",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946"
      },
      {
        "category": "external",
        "summary": "1774963",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963"
      },
      {
        "category": "external",
        "summary": "1774988",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988"
      },
      {
        "category": "external",
        "summary": "1775015",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015"
      },
      {
        "category": "external",
        "summary": "1775021",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021"
      },
      {
        "category": "external",
        "summary": "1775097",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097"
      },
      {
        "category": "external",
        "summary": "1777418",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418"
      },
      {
        "category": "external",
        "summary": "1777449",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449"
      },
      {
        "category": "external",
        "summary": "1778762",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778762"
      },
      {
        "category": "external",
        "summary": "1779594",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594"
      },
      {
        "category": "external",
        "summary": "1781679",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679"
      },
      {
        "category": "external",
        "summary": "1781810",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810"
      },
      {
        "category": "external",
        "summary": "1783459",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459"
      },
      {
        "category": "external",
        "summary": "1783534",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534"
      },
      {
        "category": "external",
        "summary": "1783561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561"
      },
      {
        "category": "external",
        "summary": "1784130",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130"
      },
      {
        "category": "external",
        "summary": "1786160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160"
      },
      {
        "category": "external",
        "summary": "1786179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179"
      },
      {
        "category": "external",
        "summary": "1790063",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063"
      },
      {
        "category": "external",
        "summary": "1802555",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1802563",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563"
      },
      {
        "category": "external",
        "summary": "1814448",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814448"
      },
      {
        "category": "external",
        "summary": "1817718",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718"
      },
      {
        "category": "external",
        "summary": "1819377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377"
      },
      {
        "category": "external",
        "summary": "1819399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399"
      },
      {
        "category": "external",
        "summary": "1820402",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820402"
      },
      {
        "category": "external",
        "summary": "1822077",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077"
      },
      {
        "category": "external",
        "summary": "1823764",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823764"
      },
      {
        "category": "external",
        "summary": "1824059",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059"
      },
      {
        "category": "external",
        "summary": "1824792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
      },
      {
        "category": "external",
        "summary": "1824918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918"
      },
      {
        "category": "external",
        "summary": "1830280",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1830280"
      },
      {
        "category": "external",
        "summary": "1831399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399"
      },
      {
        "category": "external",
        "summary": "1831699",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831699"
      },
      {
        "category": "external",
        "summary": "1832543",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543"
      },
      {
        "category": "external",
        "summary": "1832876",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876"
      },
      {
        "category": "external",
        "summary": "1834845",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845"
      },
      {
        "category": "external",
        "summary": "1839634",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634"
      },
      {
        "category": "external",
        "summary": "1844520",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844520"
      },
      {
        "category": "external",
        "summary": "1846380",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846380"
      },
      {
        "category": "external",
        "summary": "1846964",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964"
      },
      {
        "category": "external",
        "summary": "1853447",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853447"
      },
      {
        "category": "external",
        "summary": "1856588",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856588"
      },
      {
        "category": "external",
        "summary": "1860065",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065"
      },
      {
        "category": "external",
        "summary": "1874311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311"
      },
      {
        "category": "external",
        "summary": "1881424",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4431.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T14:37:44+00:00",
      "generator": {
        "date": "2024-11-22T14:37:44+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2020:4431",
      "initial_release_date": "2020-11-04T00:53:39+00:00",
      "revision_history": [
        {
          "date": "2020-11-04T00:53:39+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2020-11-04T00:53:39+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T14:37:44+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 8)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 8)",
                  "product_id": "CRB-8.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.3.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-240.el8.x86_64",
                  "product_id": "bpftool-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-core-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-240.el8.x86_64",
                  "product_id": "perf-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-240.el8.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-240.el8.x86_64",
                  "product_id": "python3-perf-0:4.18.0-240.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "bpftool-0:4.18.0-240.el8.ppc64le",
                  "product_id": "bpftool-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-core-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-core-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-devel-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-devel-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-headers-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-headers-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-modules-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-modules-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-tools-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-tools-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
                  "product_id": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "perf-0:4.18.0-240.el8.ppc64le",
                  "product_id": "perf-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-240.el8.ppc64le",
                "product": {
                  "name": "python3-perf-0:4.18.0-240.el8.ppc64le",
                  "product_id": "python3-perf-0:4.18.0-240.el8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "bpftool-0:4.18.0-240.el8.aarch64",
                  "product_id": "bpftool-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-core-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-core-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-devel-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-headers-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-modules-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-tools-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
                  "product_id": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "perf-0:4.18.0-240.el8.aarch64",
                  "product_id": "perf-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-240.el8.aarch64",
                "product": {
                  "name": "python3-perf-0:4.18.0-240.el8.aarch64",
                  "product_id": "python3-perf-0:4.18.0-240.el8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "bpftool-0:4.18.0-240.el8.s390x",
                  "product_id": "bpftool-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-core-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-core-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-core-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-devel-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-devel-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-headers-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-headers-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-modules-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-modules-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-tools-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-tools-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "perf-0:4.18.0-240.el8.s390x",
                  "product_id": "perf-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "python3-perf-0:4.18.0-240.el8.s390x",
                  "product_id": "python3-perf-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "perf-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.el8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-240.el8.src",
                "product": {
                  "name": "kernel-0:4.18.0-240.el8.src",
                  "product_id": "kernel-0:4.18.0-240.el8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-240.el8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
                  "product_id": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-240.el8?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-240.el8.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-240.el8.noarch",
                  "product_id": "kernel-doc-0:4.18.0-240.el8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-240.el8?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.src",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-240.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-240.el8.noarch",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "perf-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "perf-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "perf-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "BaseOS-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.src",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-240.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-240.el8.noarch",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "perf-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "perf-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "perf-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "perf-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
          "product_id": "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
        "relates_to_product_reference": "CRB-8.3.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-9455",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-09-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1819399"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s video driver. A kernel pointer lead, due to a WARN_ON statement could lead to a local information disclosure with system execution privileges. User interaction is not needed for exploitation. The highest threat from this vulnerability is to data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is marked as having Low impact because the information leak is very subtle and can be only used to break KASLR and not provide access to kernel memory content.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "RHBZ#1819399",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819399"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9455",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9455"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9455"
        }
      ],
      "release_date": "2019-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure"
    },
    {
      "cve": "CVE-2019-9458",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-09-07T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1819377"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s video driver. A race condition, leading to a use-after-free, could lead to a local privilege escalation. User interaction is not needed for exploitation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use after free due to race condition in the video driver leads to local privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact, because of the need of additional privileges (usually local console user) to access the video device driver.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "RHBZ#1819377",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819377"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9458"
        }
      ],
      "release_date": "2019-09-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent modules v4l2-common, v4l2-dv-timings from being loaded if not being used for primary display. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use after free due to race condition in the video driver leads to local privilege escalation"
    },
    {
      "cve": "CVE-2019-12614",
      "discovery_date": "2019-06-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1718176"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way Linux kernel\u0027s Dynamic Logical Partitioning (DLPAR) functionality on PowerPC systems handled low memory conditions on device discovery. An attacker who can change the LPAR configuration and incur low memory conditions at the same time could use this flaw to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "An attacker needs to be highly privileged to exploit this issue. He either needs to trigger LPAR configuration change (or wait for such event to happen) and incur low memory conditions at the same time. It could be argued that possessing privileges required to exploit this issue could have the same impact as the issue itself.\n\nThe indications say that this issue was found by static code analysing tool which looks for memory allocations without failure checks and not actually reproduced on a running system. The CVE assignment also looks automated and following the \"better be safe than sorry\" approach.\n\nAs such, this issue is theoretical in nature and Low impact at best.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-12614"
        },
        {
          "category": "external",
          "summary": "RHBZ#1718176",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1718176"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12614",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12614",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12614"
        }
      ],
      "release_date": "2019-06-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service"
    },
    {
      "cve": "CVE-2019-15917",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-10-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760100"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of the HCI UART driver. A local attacker with access permissions to the Bluetooth device can issue an ioctl, which triggers the hci_uart_set_proto() function in drivers/bluetooth/hci_ldisc.c. The flaw in this function can cause memory corruption or a denial of service because of a use-after-free issue when the hci_uart_register_dev() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a Moderate as it requires the local attacker to have permissions to issue ioctl commands to the bluetooth device and bluetooth hardware to be present.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15917"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760100",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760100"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15917",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15917"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module hci_uart from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in drivers/bluetooth/hci_ldisc.c"
    },
    {
      "cve": "CVE-2019-15925",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-09-05T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1759052"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds access flaw was found in the hclge_shaper_para_calc driver in the Linux kernel. Access to an array with an index higher than its maximum index will lead to an out-of-bounds access vulnerability. This could affect both data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-15925"
        },
        {
          "category": "external",
          "summary": "RHBZ#1759052",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759052"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15925",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-15925"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15925"
        }
      ],
      "release_date": "2019-09-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Blacklisting the affected HCLGE driver module until a patch is available can be done using the blacklist mechanism. This will ensure the driver is not loaded at boot time.  For instructions on how to black list a kernel module, please read: https://access.redhat.com/solutions/41278.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg"
    },
    {
      "cve": "CVE-2019-16231",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760310"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the FUJITSU Extended Socket Network driver. A call to the alloc_workqueue return was not validated and causes a denial of service at the time of failure. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760310",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760310"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16231",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2019/9/9/487",
          "url": "https://lkml.org/lkml/2019/9/9/487"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20191004-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20191004-0001/"
        }
      ],
      "release_date": "2019-09-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c"
    },
    {
      "cve": "CVE-2019-16233",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2019-10-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1760420"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference flaw was found in the QLOGIC drivers for HBA. A call to alloc_workqueue return was not validated and can cause a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "RHBZ#1760420",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760420"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16233",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16233"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2019/9/9/487",
          "url": "https://lkml.org/lkml/2019/9/9/487"
        }
      ],
      "release_date": "2019-09-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c"
    },
    {
      "cve": "CVE-2019-18808",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1777418"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the AMD Cryptographic Co-processor driver in the Linux kernel. An attacker, able to send invalid SHA type commands, could cause the system to crash. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because it affects only specific hardware enabled systems.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "RHBZ#1777418",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777418"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18808",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18808"
        }
      ],
      "release_date": "2019-11-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module ccp. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c"
    },
    {
      "cve": "CVE-2019-18809",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-10-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1777449"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Afatech 9005 DVB-T receiver driver in the Linux kernel. An attacker, with physical access to the system, could cause the system to crash following a resource cleanup. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-18809"
        },
        {
          "category": "external",
          "summary": "RHBZ#1777449",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777449"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18809",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-18809"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18809"
        }
      ],
      "release_date": "2019-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module dvb-usb-af9005. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c"
    },
    {
      "cve": "CVE-2019-19046",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak problem was found in __ipmi_bmc_register in drivers/char/ipmi/ipmi_msghandler.c in Intelligent Platform Management Interface (IPMI) which is used for incoming and outgoing message routing purpose. This flaw may allow an attacker with minimal privilege to cause a denial of service by triggering ida_simple_get() failure.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19046"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19046",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19046"
        }
      ],
      "release_date": "2019-11-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c"
    },
    {
      "cve": "CVE-2019-19056",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-19T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775097"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the mwifiex PCIE driver in the Linux kernel handled resource cleanup on a DMA mapping error. This flaw allows an attacker able to trigger the DMA mapping error to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (DMA mapping error).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19056"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775097",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775097"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19056",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19056"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19056"
        }
      ],
      "release_date": "2019-10-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex_pcie. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS"
    },
    {
      "cve": "CVE-2019-19062",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775021"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The crypto_report function mishandles resource cleanup on error. A local attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error cleanup code path.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775021",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775021"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19062",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19062"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module crypto_user. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS"
    },
    {
      "cve": "CVE-2019-19063",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1775015"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. The rtl_usb_probe function mishandles resource cleanup on error. An attacker able to induce the error conditions could use this flaw to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the resource cleanup code path (physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19063"
        },
        {
          "category": "external",
          "summary": "RHBZ#1775015",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775015"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19063",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19063"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8192cu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS"
    },
    {
      "cve": "CVE-2019-19068",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774963"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A memory leak in the realtek driver allows an attacker to cause a denial of service through memory consumption. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (physical access and/or system-wide out-of-memory condition).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19068"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774963",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774963"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19068",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19068"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19068"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module rtl8xxxu. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS"
    },
    {
      "cve": "CVE-2019-19072",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2019-11-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1774946"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the predicate_parse function in the tracing subsystem of the Linux kernel handled resource cleanup on error. This flaw allows an attacker with the ability to produce the error to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the error/resource cleanup code path (high privileges).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19072"
        },
        {
          "category": "external",
          "summary": "RHBZ#1774946",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774946"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19072",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19072"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19072"
        }
      ],
      "release_date": "2019-11-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS"
    },
    {
      "cve": "CVE-2019-19319",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-12-16T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1784130"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel\u2019s Ext4 FileSystem in the way it uses a crafted ext4 image. This flaw allows a local user with physical access to crash the system or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (physical access or user interaction to mount the crafted filesystem image).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "RHBZ#1784130",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784130"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19319",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19319"
        }
      ],
      "release_date": "2019-11-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c"
    },
    {
      "cve": "CVE-2019-19332",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2019-12-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1779594"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory write issue was found in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "RHBZ#1779594",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1779594"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19332",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/",
          "url": "https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2019/12/16/1",
          "url": "https://www.openwall.com/lists/oss-security/2019/12/16/1"
        }
      ],
      "release_date": "2019-12-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid"
    },
    {
      "cve": "CVE-2019-19447",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781679"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s ext4_unlink function. An attacker could corrupt memory or escalate privileges when deleting a file from a recently unmounted specially crafted ext4 filesystem, including local, USB, and iSCSI.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781679",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781679"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19447",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=205433",
          "url": "https://bugzilla.kernel.org/show_bug.cgi?id=205433"
        },
        {
          "category": "external",
          "summary": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447",
          "url": "https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447"
        }
      ],
      "release_date": "2019-12-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Ext4 filesytems are built into the kernel so it is not possible to prevent the kernel module from loading.  However, this flaw can be prevented by disallowing mounting of untrusted filesystems.\n\nAs mounting is a privileged operation, (except for device hotplug) removing the ability for mounting and unmounting will prevent this flaw from being exploited.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c"
    },
    {
      "cve": "CVE-2019-19524",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-04T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783459"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s input device driver functionality when unplugging a device. A user with physical access could use this flaw to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783459",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783459"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19524",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19524"
        }
      ],
      "release_date": "2019-11-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue for the Red Hat Enterprise Linux 7 or higher version, prevent module ff-memless from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free"
    },
    {
      "cve": "CVE-2019-19533",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2019-12-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783534"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An information leak flaw was found in the Linux kernel\u0027s USB digital video device driver. An attacker with a malicious USB device presenting itself as a \u0027Technotrend/Hauppauge USB DEC\u0027 device is able to issue commands to this specific device and leak kernel internal memory information.  The highest threat from this vulnerability is a breach of data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783534",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783534"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19533",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19533"
        }
      ],
      "release_date": "2019-08-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "As the ttusb_dec module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install ttusb_dec /bin/true\" \u003e\u003e /etc/modprobe.d/disable-cifs.conf \n \nThe system will need to be restarted if the ttusb_dec module is already loaded. In most circumstances, the CIFS kernel module will be unable to be unloaded while the device is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c"
    },
    {
      "cve": "CVE-2019-19537",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2019-12-03T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1783561"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel, where there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer. An attacker who can hotplug at least two devices of this class can cause a use-after-free situation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition caused by a malicious USB device in the USB character device driver layer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "RHBZ#1783561",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783561"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19537"
        }
      ],
      "release_date": "2019-08-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Many Character devices can trigger this flaw as they leverage the lower levels of the USB subsystem.\n\nThe safest method that I have found would be to disable USB ports that are able to be attacked\nusing this method, disable them first by disallowing them from waking up from low-power states \nwith the command (Replace X with the port number available).\n\necho disabled \u003e\u003e /sys/bus/usb/devices/usbX/power/wakeup \n\nThe system must also disable the specific ports power after with the command:\n\necho suspend | sudo tee /sys/bus/usb/devices/usbX/power/level\n\nThis change not persist through system reboots and must be applied at each reboot to be effective.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: race condition caused by a malicious USB device in the USB character device driver layer"
    },
    {
      "cve": "CVE-2019-19543",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-10T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1781810"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s infrared serial module. An attacker could use this flaw to corrupt memory and possibly escalate privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "RHBZ#1781810",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781810"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19543"
        }
      ],
      "release_date": "2019-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "As the  module will be auto-loaded when the relevant hardware is required, its use can be disabled  by preventing the module from loading with the following instructions:\n\n# echo \"install serial_ir  /bin/true\" \u003e\u003e /etc/modprobe.d/disable-serial-ir.conf \n \nThe system will need to be restarted if the CIFS modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c"
    },
    {
      "cve": "CVE-2019-19602",
      "cwe": {
        "id": "CWE-672",
        "name": "Operation on a Resource after Expiration or Release"
      },
      "discovery_date": "2019-12-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1784572"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. When compiled with GCC 9, a vector register corruption occurs on return from a signal handler where the top page of the signal stack had not yet been paged in which can allow a local attacker with special user privilege (or root) to leak kernel internal information. The highest threat from this vulnerability is to data confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: cached use of fpu_fpregs_owner_ctx in arch/x86/include/asm/fpu/internal.h can lead to DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19602"
        },
        {
          "category": "external",
          "summary": "RHBZ#1784572",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1784572"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19602",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19602"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19602",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19602"
        }
      ],
      "release_date": "2019-11-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: cached use of fpu_fpregs_owner_ctx in arch/x86/include/asm/fpu/internal.h can lead to DoS"
    },
    {
      "cve": "CVE-2019-19767",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-23T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1786160"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u2019s ext4 file system functionality when the user mount ext4 partition, with the usage of an additional debug parameter is defining an extra inode size. If this parameter has a non zero value, this flaw allows a local user to crash the system when inode expansion happens.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "RHBZ#1786160",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786160"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19767",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19767"
        }
      ],
      "release_date": "2019-11-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "The mitigation is not to use debug_want_extra_isize parameter when mounting ext4 FS.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c"
    },
    {
      "cve": "CVE-2019-19770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2019-12-23T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1786179"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the debugfs_remove function in the Linux kernel. The flaw could allow a local attacker with special user (or root) privilege to crash the system at the time of file or directory removal. This vulnerability can lead to a kernel information leak. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "RHBZ#1786179",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786179"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-19770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19770"
        }
      ],
      "release_date": "2019-11-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c"
    },
    {
      "cve": "CVE-2019-20054",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2019-12-28T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1790063"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of dropping sysctl entries. A local attacker who has access to load modules on the system can trigger a condition during module load failure and panic the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "RHBZ#1790063",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790063"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20054",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20054"
        }
      ],
      "release_date": "2019-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c"
    },
    {
      "cve": "CVE-2019-20636",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-04-08T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824059"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel. A crafted keycode table could be used by drivers/input/input.c to perform the out-of-bounds write. A local user with root access can insert garbage to this keycode table that can lead to out-of-bounds memory access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write via crafted keycode table",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue was rated as having Moderate impact because of the need of physical access or administrator privileges to trigger it.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20636"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824059",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824059"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20636",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20636"
        }
      ],
      "release_date": "2020-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write via crafted keycode table"
    },
    {
      "cve": "CVE-2019-20812",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2020-06-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1846462"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the af_packet functionality in the Linux kernel handled the retirement timer setting for TPACKET_v3 when getting settings from the underlying network device errors out. This flaw allows a local user who can open the af_packet domain socket and who can hit the error path, to use this vulnerability to starve the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: af_packet: TPACKET_V3: invalid timer timeout on error",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the error code path and privileges required (CAP_NET_RAW).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2019-20812"
        },
        {
          "category": "external",
          "summary": "RHBZ#1846462",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846462"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20812",
          "url": "https://www.cve.org/CVERecord?id=CVE-2019-20812"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20812",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20812"
        }
      ],
      "release_date": "2019-12-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: af_packet: TPACKET_V3: invalid timer timeout on error"
    },
    {
      "cve": "CVE-2020-0305",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-07-17T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1860065"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way the Linux kernel\u0027s filesystem subsystem handled a race condition in the chrdev_open function. This flaw allows a privileged local user to starve the resources, causing a denial of service or potentially escalating their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Moderate impact because of the preconditions needed to trigger the issue (elevated/root privileges).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "RHBZ#1860065",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860065"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0305",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0305"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079"
        }
      ],
      "release_date": "2020-07-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c"
    },
    {
      "cve": "CVE-2020-0444",
      "cwe": {
        "id": "CWE-244",
        "name": "Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)"
      },
      "discovery_date": "2021-01-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1920474"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A logic error in audit_data_to_entry can lead to a local escalation of privilege without user interaction needed. A local attacker with special user privilege could crash the system leading to information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: bad kfree in auditfilter.c may lead to escalation of privilege",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-0444"
        },
        {
          "category": "external",
          "summary": "RHBZ#1920474",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920474"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0444",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-0444"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0444",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0444"
        }
      ],
      "release_date": "2021-01-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: bad kfree in auditfilter.c may lead to escalation of privilege"
    },
    {
      "cve": "CVE-2020-8647",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802563"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s virtual console resize functionality. An attacker with local access to virtual consoles can use the virtual console resizing code to gather kernel internal data structures.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having Moderate impact because the information leak is limited.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802563",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802563"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8647",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8647"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "The attack vector can be significantly reduced by preventing users from being able to log into the local virtual console.\n\nSee the instructions on disabling local login here: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/managing_smart_cards/pam_configuration_files , See the section on \"pam_console\" to deny users logging into the console.  This mechanism should work from el6 forward to current versions of Red Hat Enterprise Linux.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c"
    },
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2020-8649",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802555"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console. An out-of-bounds read can occur, leaking information to the console.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as a having Moderate impact, it is an infoleak that is written to the screen.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802555",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802555"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8649",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8649"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c"
    },
    {
      "cve": "CVE-2020-10732",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "discovery_date": "2020-05-05T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1831399"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: uninitialized kernel data leak in userspace coredumps",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "RHBZ#1831399",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831399"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10732",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10732"
        }
      ],
      "release_date": "2020-05-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Possible mitigation would be to disable core dumps system-wide by setting:\n\n* hard core 0\n\nIn the  /etc/security/limits.conf file and restarting applications/services/processes which users may have access to or simply reboot the system.  This disables core dumps which may not be a suitable workaround in your environment.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: uninitialized kernel data leak in userspace coredumps"
    },
    {
      "cve": "CVE-2020-10751",
      "cwe": {
        "id": "CWE-349",
        "name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
      },
      "discovery_date": "2020-05-25T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1839634"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: SELinux netlink permission check bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "RHBZ#1839634",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839634"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10751",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10751"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/",
          "url": "https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2020/04/30/5",
          "url": "https://www.openwall.com/lists/oss-security/2020/04/30/5"
        }
      ],
      "release_date": "2020-04-27T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: SELinux netlink permission check bypass"
    },
    {
      "cve": "CVE-2020-10773",
      "cwe": {
        "id": "CWE-626",
        "name": "Null Byte Interaction Error (Poison Null Byte)"
      },
      "discovery_date": "2019-10-28T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1846380"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u2019s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: kernel stack information leak on s390/s390x",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of being limited to only s390 architecture and very limited kernel stack exposure.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10773"
        },
        {
          "category": "external",
          "summary": "RHBZ#1846380",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846380"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10773",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10773"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10773",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10773"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f"
        }
      ],
      "release_date": "2019-10-28T14:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: kernel stack information leak on s390/s390x"
    },
    {
      "cve": "CVE-2020-10774",
      "cwe": {
        "id": "CWE-909",
        "name": "Missing Initialization of Resource"
      },
      "discovery_date": "2020-06-02T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1846964"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw memory disclosure flaw was found in the Linux kernel\u2019s sysctl subsystem in reading the /proc/sys/kernel/rh_features file. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the limited and random (non-controllable by attacker) memory disclosure.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10774"
        },
        {
          "category": "external",
          "summary": "RHBZ#1846964",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846964"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10774",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10774"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10774"
        }
      ],
      "release_date": "2020-06-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features"
    },
    {
      "cve": "CVE-2020-10942",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2020-03-24T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1817718"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack buffer overflow issue was found in the get_raw_socket() routine of the Host kernel accelerator for virtio net (vhost-net) driver. It could occur while doing an ictol(VHOST_NET_SET_BACKEND) call, and retrieving socket name in a kernel stack variable via get_raw_socket(). A user able to perform ioctl(2) calls on the \u0027/dev/vhost-net\u0027 device may use this flaw to crash the kernel resulting in DoS issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect the kernel package as shipped with the Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\nThis issue affects the kernel package as shipped with the Red Hat Enterprise Linux 6, 7 and 8. Future kernel updates for Red Hat Enterprise Linux 6, 7 and 8 may address this issue.\n\nIt is rated to have Low impact because it is quite difficult/unlikely to be triggered by a guest (or even host) user. In case it does happen, like in the upstream report, the stack overflow shall hit the stack canaries, resulting in DoS by crashing the kernel.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "RHBZ#1817718",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1817718"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10942",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10942"
        }
      ],
      "release_date": "2020-03-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field"
    },
    {
      "cve": "CVE-2020-11565",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-04-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824918"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write flaw was found in the Linux kernel. An empty nodelist in mempolicy.c is mishandled durig mount option parsing leading to a stack-based out-of-bounds write. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-11565"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824918",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824918"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11565",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11565"
        }
      ],
      "release_date": "2020-04-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c"
    },
    {
      "cve": "CVE-2020-11668",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2020-04-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1824792"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the Xirlink camera USB driver \u0027xirlink-cit\u0027 in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1824792",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824792"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11668"
        }
      ],
      "release_date": "2020-01-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is to skip loading the affected module \u0027xirlink-cit\u0027 onto the system till we have a fix available, this can be done by a blacklist mechanism, this will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c"
    },
    {
      "cve": "CVE-2020-12465",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2020-04-29T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1831699"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory overflow and data corruption flaw were found in the Mediatek MT76 driver module for WiFi in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c. An oversized packet with too many rx fragments causes an overflow and corruption in memory of adjacent pages. A local attacker with a special user or root privileges can cause a denial of service or a leak of internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12465"
        },
        {
          "category": "external",
          "summary": "RHBZ#1831699",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831699"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12465",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12465"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12465",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12465"
        }
      ],
      "release_date": "2020-03-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is to skip loading the affected module mt76 onto the system until we have a fix available. This can be done by a blacklist mechanism and ensures the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c"
    },
    {
      "cve": "CVE-2020-12655",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2020-05-05T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1832543"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is rated as having Low impact because of the preconditions needed to trigger it (administrative account or physical access).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "RHBZ#1832543",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832543"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12655",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12655"
        }
      ],
      "release_date": "2020-03-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "This flaw requires an attacker being able to have the system mount a crafted filesystem.\n\nIf the xfs filesystem is not in use, the \u0027xfs\u0027 kernel module can be blacklisted and the module\nwill not be loaded when the filesystem is mounted, mounting will fail.\n\nHowever, if this filesystem is in use, this workaround will not be suitable.\n\nTo find out how to blacklist the \"xfs\" kernel module please see https://access.redhat.com/solutions/41278 or contact Red hat Global Support services",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: sync of excessive duration via an XFS v5 image with crafted metadata"
    },
    {
      "cve": "CVE-2020-12659",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2020-05-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1832876"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds (OOB) memory access flaw was found in the Network XDP (the eXpress Data Path) module in the Linux kernel\u0027s xdp_umem_reg function in net/xdp/xdp_umem.c. When a user with special user privilege of CAP_NET_ADMIN (or root) calls setsockopt to register umem ring on XDP socket, passing the headroom value larger than the available space in the chunk, it leads to an out-of-bounds write, causing panic or possible memory corruption. This flaw may lead to privilege escalation if a local end-user is granted permission to influence the execution of code in this manner.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12659"
        },
        {
          "category": "external",
          "summary": "RHBZ#1832876",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832876"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12659",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12659"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12659"
        }
      ],
      "release_date": "2020-05-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption"
    },
    {
      "cve": "CVE-2020-12770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-05-09T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1834845"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in sg_write in drivers/scsi/sg.c in the SCSI generic (sg) driver subsystem. This flaw allows an attacker with local access and special user or root privileges to cause a denial of service if the allocated list is not cleaned with an invalid (Sg_fd * sfp) pointer at the time of failure, also possibly causing a kernel internal information leak problem.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "RHBZ#1834845",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834845"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12770",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12770"
        }
      ],
      "release_date": "2020-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: sg_write function lacks an sg_remove_request call in a certain failure case"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Adam Zabrocki"
          ]
        }
      ],
      "cve": "CVE-2020-12826",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "discovery_date": "2020-03-27T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1822077"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers.  A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "RHBZ#1822077",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1822077"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12826",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12826"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da"
        },
        {
          "category": "external",
          "summary": "https://lists.openwall.net/linux-kernel/2020/03/24/1803",
          "url": "https://lists.openwall.net/linux-kernel/2020/03/24/1803"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1",
          "url": "https://www.openwall.com/lists/kernel-hardening/2020/03/25/1"
        }
      ],
      "release_date": "2020-05-12T05:40:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: possible to send arbitrary signals to a privileged (suidroot) parent process"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Rakesh Rakesh"
          ],
          "organization": "Netezza Support"
        }
      ],
      "cve": "CVE-2020-14381",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-09-01T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1874311"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "RHBZ#1874311",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874311"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14381",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14381"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254"
        }
      ],
      "release_date": "2020-05-07T19:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: referencing inode of removed superblock in get_futex_key() causes UAF"
    },
    {
      "cve": "CVE-2020-25641",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2020-09-17T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1881424"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s implementation of biovecs. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ],
        "known_not_affected": [
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "RHBZ#1881424",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881424"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25641",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25641"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124"
        },
        {
          "category": "external",
          "summary": "https://www.kernel.org/doc/html/latest/block/biovecs.html",
          "url": "https://www.kernel.org/doc/html/latest/block/biovecs.html"
        }
      ],
      "release_date": "2020-09-30T00:24:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Zhenpeng Lin"
          ]
        }
      ],
      "cve": "CVE-2021-3715",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-08-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1993988"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
          "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
          "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "RHBZ#1993988",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
        }
      ],
      "release_date": "2021-09-07T08:25:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-11-04T00:53:39+00:00",
          "details": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2020:4431"
        },
        {
          "category": "workaround",
          "details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
          "product_ids": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "BaseOS-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "BaseOS-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:bpftool-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.src",
            "CRB-8.3.0.GA:kernel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-abi-whitelists-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-cross-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-core-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debug-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-doc-0:4.18.0-240.el8.noarch",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-headers-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-modules-extra-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-tools-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:kernel-tools-libs-devel-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:kernel-zfcpdump-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-core-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-devel-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:perf-debuginfo-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-0:4.18.0-240.el8.x86_64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.aarch64",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.ppc64le",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.s390x",
            "CRB-8.3.0.GA:python3-perf-debuginfo-0:4.18.0-240.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
    }
  ]
}
  rhsa-2021_2316
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\n* kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363)\n\n* kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364)\n\n* kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* lru-add-drain workqueue on RT is allocated without being used (BZ#1894587)\n\n* kernel-rt: update to the latest RHEL7.9.z source tree (BZ#1953118)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:2316",
        "url": "https://access.redhat.com/errata/RHSA-2021:2316"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1894587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894587"
      },
      {
        "category": "external",
        "summary": "1922249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
      },
      {
        "category": "external",
        "summary": "1930246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
      },
      {
        "category": "external",
        "summary": "1930249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
      },
      {
        "category": "external",
        "summary": "1930251",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
      },
      {
        "category": "external",
        "summary": "1940627",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2316.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-15T11:50:13+00:00",
      "generator": {
        "date": "2024-11-15T11:50:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:2316",
      "initial_release_date": "2021-06-08T22:44:01+00:00",
      "revision_history": [
        {
          "date": "2021-06-08T22:44:01+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-06-08T22:44:01+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:50:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
                  "product_id": "7Server-NFV-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt:7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time (v. 7)",
                  "product_id": "7Server-RT-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt:7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
                  "product_id": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.31.1.rt56.1169.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.31.1.rt56.1169.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
                  "product_id": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.31.1.rt56.1169.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
          "product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-NFV-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
          "product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2020-12362",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Integer overflow in Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8)  print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12362"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Integer overflow in Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-12363",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. Improper input validation in some Intel(R) Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper input validation in some Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12363",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Improper input validation in some Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-12364",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930251"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930251",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12364",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-27170",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2021-03-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1940627"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernels eBPF verification code. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN.   A local user with the ability to insert eBPF instructions can use the eBPF verifier to abuse a spectre like flaw where they can infer all system memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Speculation on pointer arithmetic against bpf_context pointer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-27170"
        },
        {
          "category": "external",
          "summary": "RHBZ#1940627",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27170",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170"
        }
      ],
      "release_date": "2021-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        },
        {
          "category": "workaround",
          "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.   This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Speculation on pointer arithmetic against bpf_context pointer"
    },
    {
      "cve": "CVE-2021-3347",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-01-29T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1922249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Use after free via PI futex state",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
          "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
          "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
          "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "RHBZ#1922249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
        }
      ],
      "release_date": "2021-01-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:44:01+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2316"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.src",
            "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.31.1.rt56.1169.el7.noarch",
            "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64",
            "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.31.1.rt56.1169.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Use after free via PI futex state"
    }
  ]
}
  RHSA-2021:3320
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:3320",
        "url": "https://access.redhat.com/errata/RHSA-2021:3320"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1970807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3320.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2025-10-09T20:53:40+00:00",
      "generator": {
        "date": "2025-10-09T20:53:40+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2021:3320",
      "initial_release_date": "2021-08-31T08:31:38+00:00",
      "revision_history": [
        {
          "date": "2021-08-31T08:31:38+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-08-31T08:31:39+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T20:53:40+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
                  "product_id": "7Server-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
                  "product_id": "7Server-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
                  "product_id": "7Server-optional-7.6.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
                  "product_id": "7Server-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
                  "product_id": "7Server-optional-7.6.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.80.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.80.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-957.80.1.el7.src",
                  "product_id": "kernel-0:3.10.0-957.80.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.80.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.80.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-957.80.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
          "product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
          "product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
          "product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
          "product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
          "product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.6.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:31:38+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3320"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2021-32399",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "discovery_date": "2021-05-11T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1970807"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: race condition for removal of the HCI controller",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
          "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
          "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
          "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
          "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "RHBZ#1970807",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
        }
      ],
      "release_date": "2021-05-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-08-31T08:31:38+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:3320"
        },
        {
          "category": "workaround",
          "details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
          "product_ids": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
            "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
            "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
            "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
            "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: race condition for removal of the HCI controller"
    }
  ]
}
  rhsa-2021_2314
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\n* kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363)\n\n* kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364)\n\n* kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel crash when call the timer function (sctp_generate_proto_unreach_event) of sctp module (BZ#1707184)\n\n* SCSI error handling process on HP P440ar controller gets stuck indefinitely in device reset operation (BZ#1830268)\n\n* netfilter: reproducible deadlock on nft_log module autoload (BZ#1858329)\n\n* netfilter: NULL pointer dereference in nf_tables_set_lookup() (BZ#1873171)\n\n* [DELL EMC 7.9 Bug]: No acpi_pad threads on top command for \"power cap policy equal to 0 watts\" (BZ#1883174)\n\n* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache. (BZ#1886003)\n\n* netxen driver performs poorly with RT kernel (BZ#1894274)\n\n* gendisk-\u003edisk_part_tbl-\u003elast_lookup retains pointer after partition deletion (BZ#1898596)\n\n* Kernel experiences panic in update_group_power() due to division error even with Bug 1701115 fix (BZ#1910763)\n\n* RHEL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path (BZ#1917839)\n\n* RHEL7.9 - mm/THP: do not access vma-\u003evm_mm after calling handle_userfault (BZ#1917840)\n\n* raid: wrong raid io account (BZ#1927106)\n\n* qla2x00_status_cont_entry() missing upstream patch that prevents unnecessary ABRT/warnings (BZ#1933784)\n\n* RHEL 7.9.z - System hang caused by workqueue stall in qla2xxx driver (BZ#1937945)\n\n* selinux: setsebool can trigger a deadlock (BZ#1939091)\n\n* [Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V (BZ#1941841)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2021:2314",
        "url": "https://access.redhat.com/errata/RHSA-2021:2314"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1802559",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
      },
      {
        "category": "external",
        "summary": "1922249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
      },
      {
        "category": "external",
        "summary": "1930246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
      },
      {
        "category": "external",
        "summary": "1930249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
      },
      {
        "category": "external",
        "summary": "1930251",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
      },
      {
        "category": "external",
        "summary": "1940627",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
      },
      {
        "category": "external",
        "summary": "1941841",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941841"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2314.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-15T11:50:20+00:00",
      "generator": {
        "date": "2024-11-15T11:50:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2021:2314",
      "initial_release_date": "2021-06-08T22:46:51+00:00",
      "revision_history": [
        {
          "date": "2021-06-08T22:46:51+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2021-06-08T22:46:51+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T11:50:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "perf-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.31.1.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.src",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.src",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
                  "product_id": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.31.1.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
                "product": {
                  "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
                  "product_id": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.31.1.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.31.1.el7?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "perf-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "perf-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.31.1.el7?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "perf-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "perf-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                "product": {
                  "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_id": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.31.1.el7?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch"
        },
        "product_reference": "kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        },
        "product_reference": "python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2020-02-06T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1802559"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user  to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "RHBZ#1802559",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
        }
      ],
      "release_date": "2020-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
    },
    {
      "cve": "CVE-2020-12362",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Integer overflow in Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8)  print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12362"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Integer overflow in Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-12363",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. Improper input validation in some Intel(R) Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Improper input validation in some Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12363",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Improper input validation in some Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-12364",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2021-02-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1930251"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "RHBZ#1930251",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12364",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "release_date": "2021-02-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers"
    },
    {
      "cve": "CVE-2020-27170",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2021-03-18T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1940627"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernels eBPF verification code. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN.   A local user with the ability to insert eBPF instructions can use the eBPF verifier to abuse a spectre like flaw where they can infer all system memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Speculation on pointer arithmetic against bpf_context pointer",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2020-27170"
        },
        {
          "category": "external",
          "summary": "RHBZ#1940627",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1940627"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27170",
          "url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27170"
        }
      ],
      "release_date": "2021-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        },
        {
          "category": "workaround",
          "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.   This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Speculation on pointer arithmetic against bpf_context pointer"
    },
    {
      "cve": "CVE-2021-3347",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2021-01-29T00:00:00+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1922249"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Use after free via PI futex state",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
          "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
          "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
        ],
        "known_not_affected": [
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.ppc64le",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.s390x",
          "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.31.1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "RHBZ#1922249",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
        }
      ],
      "release_date": "2021-01-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2021-06-08T22:46:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2021:2314"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.src",
            "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.31.1.el7.noarch",
            "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.31.1.el7.x86_64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.ppc64le",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.s390x",
            "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.31.1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Use after free via PI futex state"
    }
  ]
}
  opensuse-su-2020:0336-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-14615: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may have allowed an unauthenticated user to potentially enable information disclosure via local access (bnc#1160195 bnc#1165881).\n- CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP (bnc#1157157).\n- CVE-2019-14897: A stack-based buffer overflow was found in the Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA (bnc#1157155).\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c. It did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107).\n- CVE-2019-16994: In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a (bnc#1161523).\n- CVE-2019-18808: A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption), aka CID-128c66429247 (bnc#1156259).\n- CVE-2019-19036: btrfs_root_node in fs/btrfs/ctree.c allowed a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero (bnc#1157692).\n- CVE-2019-19045: A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c allowed attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7 (bnc#1161522).\n- CVE-2019-19051: A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c allowed attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7 (bnc#1159024).\n- CVE-2019-19054: A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c allowed attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b (bnc#1161518).\n- CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd (bnc#1157303).\n- CVE-2019-19318: Mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem (bnc#1158026).\n- CVE-2019-19319: A setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).\n- CVE-2019-19332: An out-of-bounds memory write issue was found in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service (bnc#1158827).\n- CVE-2019-19338: There was an incomplete fix for Transaction Asynchronous Abort (TAA) (bnc#1158954).\n- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19526: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098 (bnc#1158893).\n- CVE-2019-19527: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e (bnc#1158900).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c (bnc#1158824).\n- CVE-2019-19533: There was an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464 (bnc#1158834).\n- CVE-2019-19535: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042 (bnc#1158903).\n- CVE-2019-19537: There was a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c (bnc#1158904).\n- CVE-2019-19767: The Linux kernel mishandled ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163 (bnc#1159297).\n- CVE-2019-19927: Mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module (bnc#1160147).\n- CVE-2019-19965: There was a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5 (bnc#1159911).\n- CVE-2019-19966: There was a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655 (bnc#1159841).\n- CVE-2019-20054: There was a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e (bnc#1159910).\n- CVE-2019-20095: mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c had some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service (bnc#1159909).\n- CVE-2019-20096: There was a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b (bnc#1159908).\n- CVE-2020-2732: Fixed an issue affecting Intel CPUs where an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources (bsc#1163971).\n- CVE-2020-7053: There was a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c (bnc#1160966).\n- CVE-2020-8428: fs/namei.c has a may_create_in_sticky use-after-free, which allowed local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed (bnc#1162109).\n- CVE-2020-8648: There was a use-after-free vulnerability in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bnc#1162928).\n- CVE-2020-8992: ext4_protect_reserved_inode in fs/ext4/block_validity.c allowed attackers to cause a denial of service (soft lockup) via a crafted journal size (bnc#1164069).\n- CVE-2019-19523: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bnc#1158823).\n\nThe following non-security bugs were fixed:\n\n- smb3: print warning once if posix context returned on open  (bsc#1144333).\n- 6pack,mkiss: fix possible deadlock (bsc#1051510).\n- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).\n- ACPI / APEI: Switch estatus pool to use vmalloc memory (bsc#1051510).\n- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).\n- ACPI / video: Add force_none quirk for Dell OptiPlex 9020M (bsc#1051510).\n- ACPI / watchdog: Fix init failure with overlapping register regions (bsc#1162557).\n- ACPI / watchdog: Set default timeout in probe (bsc#1162557).\n- ACPI: OSL: only free map once in osl.c (bsc#1051510).\n- ACPI: PM: Avoid attaching ACPI PM domain to certain devices (bsc#1051510).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: fix acpi_find_child_device() invocation in acpi_preset_companion() (bsc#1051510).\n- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).\n- ACPI: video: Do not export a non working backlight interface on MSI MS-7721 boards (bsc#1051510).\n- ACPI: watchdog: Allow disabling WDAT at boot (bsc#1162557).\n- ALSA: control: remove useless assignment in .info callback of PCM chmap element (git-fixes).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).\n- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: hda - Add docking station support for Lenovo Thinkpad T420s (git-fixes).\n- ALSA: hda - Apply sync-write workaround to old Intel platforms, too (bsc#1111666).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda - constify and cleanup static NodeID tables (bsc#1111666).\n- ALSA: hda - fixup for the bass speaker on Lenovo Carbon X1 7th gen (git-fixes).\n- ALSA: hda/analog - Minor optimization for SPDIF mux connections (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).\n- ALSA: hda/hdmi - Clean up Intel platform-specific fixup checks (bsc#1111666).\n- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).\n- ALSA: hda/hdmi - add retry logic to parse_intel_hdmi() (git-fixes).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).\n- ALSA: hda/realtek - Add Bass Speaker and fixed dac for bass speaker (bsc#1111666).\n- ALSA: hda/realtek - Add Headset Mic supported for HP cPC (bsc#1111666).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALCS1200A (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for the bass speaker on Lenovo Yoga X1 7th gen (bsc#1111666).\n- ALSA: hda/realtek - Apply mic mute LED quirk for Dell E7xx laptops, too (bsc#1111666).\n- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).\n- ALSA: hda/realtek - Enable the bass speaker of ASUS UX431FLC (bsc#1111666).\n- ALSA: hda/realtek - Fix inverted bass GPIO pin on Acer 8951G (git-fixes).\n- ALSA: hda/realtek - Fix silent output on MSI-GL73 (git-fixes).\n- ALSA: hda/realtek - Fixed one of HP ALC671 platform Headset Mic supported (bsc#1111666).\n- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).\n- ALSA: hda/realtek - More constifications (bsc#1111666).\n- ALSA: hda/realtek - Set EAPD control to default for ALC222 (bsc#1111666).\n- ALSA: hda: Add Clevo W65_67SB the power_save blacklist (git-fixes).\n- ALSA: hda: Add JasperLake PCI ID and codec vid (bsc#1111666).\n- ALSA: hda: Clear RIRB status before reading WP (bsc#1111666).\n- ALSA: hda: Constify snd_kcontrol_new items (bsc#1111666).\n- ALSA: hda: Constify snd_pci_quirk tables (bsc#1111666).\n- ALSA: hda: More constifications (bsc#1111666).\n- ALSA: hda: Reset stream if DMA RUN bit not cleared (bsc#1111666).\n- ALSA: hda: Use scnprintf() for printing texts for sysfs/procfs (git-fixes).\n- ALSA: hda: constify copied structure (bsc#1111666).\n- ALSA: hda: correct kernel-doc parameter descriptions (bsc#1111666).\n- ALSA: hda: hdmi - add Tigerlake support (bsc#1111666).\n- ALSA: hda: hdmi - fix pin setup on Tigerlake (bsc#1111666).\n- ALSA: hda: patch_hdmi: remove warnings with empty body (bsc#1111666).\n- ALSA: hda: patch_realtek: fix empty macro usage in if block (bsc#1111666).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).\n- ALSA: seq: Avoid concurrent access to queue flags (git-fixes).\n- ALSA: seq: Fix concurrent access to queue current tick/time (git-fixes).\n- ALSA: seq: Fix racy access for queue timer in proc read (bsc#1051510).\n- ALSA: sh: Fix compile warning wrt const (git-fixes).\n- ALSA: sh: Fix unused variable warnings (bsc#1111666).\n- ALSA: usb-audio: Apply sample rate quirk for Audioengine D1 (git-fixes).\n- ALSA: usb-audio: Apply the sample rate quirk for Bose Companion 5 (bsc#1111666).\n- ALSA: usb-audio: Fix endianess in descriptor validation (bsc#1111666).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: fix sync-ep altsetting sanity check (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: au8540: use 64-bit arithmetic instead of 32-bit (bsc#1051510).\n- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).\n- ASoC: cs4349: Use PM ops \u0027cs4349_runtime_pm\u0027 (bsc#1051510).\n- ASoC: msm8916-wcd-analog: Fix selected events for MIC BIAS External1 (bsc#1051510).\n- ASoC: samsung: i2s: Fix prescaler setting for the secondary DAI (bsc#1111666).\n- ASoC: sun8i-codec: Fix setting DAI data format (git-fixes).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- Bluetooth: Fix race condition in hci_release_sock() (bsc#1051510).\n- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).\n- btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- btrfs: fix block group remaining RO forever after error during device replace (bsc#1160442).\n- btrfs: fix btrfs_write_inode vs delayed iput deadlock (bsc#1154243).\n- btrfs: fix infinite loop during fsync after rename operations (bsc#1163383).\n- btrfs: fix infinite loop during nocow writeback due to race (bsc#1160804).\n- btrfs: fix missing data checksums after replaying a log tree (bsc#1161931).\n- btrfs: fix negative subv_writers counter and data space leak after buffered write (bsc#1160802).\n- btrfs: fix race between adding and putting tree mod seq elements and nodes (bsc#1163384).\n- btrfs: fix removal logic of the tree mod log that leads to use-after-free issues (bsc#1160803).\n- btrfs: fix selftests failure due to uninitialized i_mode in test inodes (Fix for dependency of bsc#1157692).\n- btrfs: make tree checker detect checksum items with overlapping ranges (bsc#1161931).\n- btrfs: send, skip backreference walking for extents with many references (bsc#1162139).\n- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n- CIFS: Add support for setting owner info, dos attributes, and create time (bsc#1144333).\n- CIFS: Close cached root handle only if it had a lease (bsc#1144333).\n- CIFS: Close open handle after interrupted close (bsc#1144333).\n- CIFS: Do not miss cancelled OPEN responses (bsc#1144333).\n- CIFS: Fix NULL pointer dereference in mid callback (bsc#1144333).\n- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bsc#1144333).\n- CIFS: Fix task struct use-after-free on reconnect (bsc#1144333).\n- CIFS: Properly process SMB3 lease breaks (bsc#1144333).\n- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1144333).\n- CIFS: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1144333).\n- CIFS: Use common error handling code in smb2_ioctl_query_info() (bsc#1144333).\n- CIFS: Use memdup_user() rather than duplicating its implementation (bsc#1144333).\n- CIFS: fix a white space issue in cifs_get_inode_info() (bsc#1144333).\n- CIFS: refactor cifs_get_inode_info() (bsc#1144333).\n- CIFS: remove set but not used variables \u0027cinode\u0027 and \u0027netfid\u0027 (bsc#1144333).\n- Cover up kABI breakage due to DH key verification (bsc#1155331).\n- Delete patches which cause regression (bsc#1165527 ltc#184149).\n- Documentation: Document arm64 kpti control (bsc#1162623).\n- Enable CONFIG_BLK_DEV_SR_VENDOR (boo#1164632).\n- Fix the locking in dcache_readdir() and friends (bsc#1123328).\n- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).\n- HID: hiddev: Fix race in in hiddev_disconnect() (git-fixes).\n- HID: hidraw, uhid: Always report EPOLLOUT (bsc#1051510).\n- HID: hidraw: Fix returning EPOLLOUT from hidraw_poll (bsc#1051510).\n- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).\n- HID: uhid: Fix returning EPOLLOUT from uhid_char_poll (bsc#1051510).\n- IB/hfi1: Close window for pq and request coliding (bsc#1060463 ).\n- IB/hfi1: Do not cancel unused work item (bsc#1114685 ).\n- IB/mlx5: Fix steering rule of drop and count (bsc#1103991 ).\n- IB/mlx5: Remove dead code (bsc#1103991).\n- Input: aiptek - fix endpoint sanity check (bsc#1051510).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: gtco - fix endpoint sanity check (bsc#1051510).\n- Input: keyspan-remote - fix control-message timeouts (bsc#1051510).\n- Input: pegasus_notetaker - fix endpoint sanity check (bsc#1051510).\n- Input: pm8xxx-vib - fix handling of separate enable register (bsc#1051510).\n- Input: rmi_f54 - read from FIFO in 32 byte blocks (bsc#1051510).\n- Input: sun4i-ts - add a check for devm_thermal_zone_of_sensor_register (bsc#1051510).\n- Input: sur40 - fix interface sanity checks (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - simplify data read in rmi_f54_work (bsc#1051510).\n- KVM: Clean up __kvm_gfn_to_hva_cache_init() and its callers (bsc#1133021).\n- KVM: PPC: Book3S HV: Uninit vCPU if vcore creation fails (bsc#1061840).\n- KVM: PPC: Book3S PR: Fix -Werror=return-type build failure (bsc#1061840).\n- KVM: PPC: Book3S PR: Free shared page if mmu initialization fails (bsc#1061840).\n- KVM: SVM: Override default MMIO mask if memory encryption is enabled (bsc#1162618).\n- KVM: arm64: Store vcpu on the stack during __guest_enter() (bsc#1133021).\n- KVM: fix spectrev1 gadgets (bsc#1164705).\n- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).\n- KVM: s390: ENOTSUPP -\u003e EOPNOTSUPP fixups (bsc#1133021).\n- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).\n- KVM: s390: do not clobber registers during guest reset/store status (bsc#1133021).\n- KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks (bsc#1164734).\n- KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (bsc#1164733).\n- KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() from Spectre-v1/L1TF attacks (bsc#1164731).\n- KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF attacks (bsc#1164732).\n- KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks (bsc#1164728).\n- KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks (bsc#1164729).\n- KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks (bsc#1164712).\n- KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks (bsc#1164730).\n- KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks (bsc#1164735).\n- KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks (bsc#1164705).\n- KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks (bsc#1164727).\n- KVM: x86: Remove a spurious export of a static function (bsc#1158954).\n- NFC: fdp: fix incorrect free object (networking-stable-19_11_10).\n- NFC: pn533: fix bulk-message timeout (bsc#1051510).\n- NFC: pn544: Adjust indentation in pn544_hci_check_presence (git-fixes).\n- NFC: st21nfca: fix double free (networking-stable-19_11_10).\n- PCI/IOV: Fix memory leak in pci_iov_add_virtfn() (git-fixes).\n- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).\n- PCI/switchtec: Fix vep_vector_number ioread width (bsc#1051510).\n- PCI: Add DMA alias quirk for Intel VCA NTB (bsc#1051510).\n- PCI: Do not disable bridge BARs when assigning bus resources (bsc#1051510).\n- PCI: pciehp: Avoid returning prematurely from sysfs requests (git-fixes).\n- PCI: rpaphp: Add drc-info support for hotplug slot registration (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Annotate and correctly byte swap DRC properties (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Avoid a sometimes-uninitialized warning (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Correctly match ibm, my-drc-index to drc-name when using drc-info (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Do not rely on firmware feature to imply drc-info support (bsc#1157480 ltc#181028).\n- PCI: rpaphp: Fix up pointer to first drc-info entry (bsc#1157480 ltc#181028).\n- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).\n- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).\n- RDMA/bnxt_re: Avoid freeing MR resources if dereg fails (bsc#1050244).\n- RDMA/bnxt_re: Enable SRIOV VF support on Broadcom\u0027s 57500 adapter series (bsc#1154916).\n- RDMA/bnxt_re: Fix chip number validation Broadcom\u0027s Gen P5 series (bsc#1157895).\n- RDMA/bnxt_re: Fix missing le16_to_cpu (bsc#1157895).\n- RDMA/cma: Fix unbalanced cm_id reference count during address resolve (bsc#1103992).\n- RDMA/hfi1: Fix memory leak in _dev_comp_vect_mappings_create (bsc#1114685).\n- RDMA/hns: Bugfix for qpc/cqc timer configuration (bsc#1104427 bsc#1126206).\n- RDMA/hns: Correct the value of srq_desc_size (bsc#1104427 ).\n- RDMA/hns: Fix to support 64K page for srq (bsc#1104427 ).\n- RDMA/hns: Prevent memory leaks of eq-\u003ebuf_list (bsc#1104427 ).\n- RDMA/uverbs: Verify MR access flags (bsc#1103992).\n- crypto/dh: Adjust for change of DH_KPP_SECRET_MIN_SIZE in 35f7d5225ffcbf1b759f641aec1735e3a89b1914\n- crypto/dh: Remove the fips=1 check in dh.c dh.c is not fips-specific and should perform the same regardless of this setting.\n- Revert \u0027HID: add NOGET quirk for Eaton Ellipse MAX UPS\u0027 (git-fixes).\n- Revert \u0027Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers\u0027 (bsc#1051510).\n- Revert \u0027ath10k: fix DMA related firmware crashes on multiple devices\u0027 (git-fixes).\n- Revert \u0027locking/pvqspinlock: Do not wait if vCPU is preempted\u0027 (bsc#1050549).\n- Revert \u0027mmc: sdhci: Fix incorrect switch to HS mode\u0027 (bsc#1051510).\n- Revert patches.suse/samples-bpf-add-a-test-for-bpf_override_return.patch (bsc#1159500)\n- SMB3: Backup intent flag missing from some more ops (bsc#1144333).\n- SMB3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1144333).\n- SMB3: Fix persistent handles reconnect (bsc#1144333).\n- SUNRPC: Fix svcauth_gss_proxy_init() (bsc#1103992).\n- Staging: iio: adt7316: Fix i2c data reading, set the data field (bsc#1051510).\n- USB: EHCI: Do not return -EPIPE when hub is disconnected (git-fixes).\n- USB: adutux: fix interface sanity check (bsc#1051510).\n- USB: atm: ueagle-atm: add missing endpoint check (bsc#1051510).\n- USB: core: add endpoint-blacklist quirk (git-fixes).\n- USB: core: fix check for duplicate endpoints (git-fixes).\n- USB: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- USB: idmouse: fix interface sanity checks (bsc#1051510).\n- USB: quirks: blacklist duplicate ep on Sound Devices USBPre2 (git-fixes).\n- USB: serial: ch341: handle unbound port at reset_resume (bsc#1051510).\n- USB: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).\n- USB: serial: io_edgeport: add missing active-port sanity check (bsc#1051510).\n- USB: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n- USB: serial: io_edgeport: handle unbound ports on URB completion (bsc#1051510).\n- USB: serial: io_edgeport: use irqsave() in USB\u0027s complete callback (bsc#1051510).\n- USB: serial: ir-usb: add missing endpoint sanity check (bsc#1051510).\n- USB: serial: ir-usb: fix IrLAP framing (bsc#1051510).\n- USB: serial: ir-usb: fix link-speed handling (bsc#1051510).\n- USB: serial: keyspan: handle unbound ports (bsc#1051510).\n- USB: serial: opticon: fix control-message timeouts (bsc#1051510).\n- USB: serial: option: Add support for Quectel RM500Q (bsc#1051510).\n- USB: serial: option: add Telit ME910G1 0x110a composition (git-fixes).\n- USB: serial: option: add ZLP support for 0x1bc7/0x9010 (git-fixes).\n- USB: serial: option: add support for Quectel RM500Q in QDL mode (git-fixes).\n- USB: serial: quatech2: handle unbound ports (bsc#1051510).\n- USB: serial: simple: Add Motorola Solutions TETRA MTP3xxx and MTP85xx (bsc#1051510).\n- USB: serial: suppress driver bind attributes (bsc#1051510).\n- USB: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- USB: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- Update patches.suse/powerpc-xive-Implement-get_irqchip_state-method-for-.patch (bsc#1085030).\n- af_packet: set defaule value for tmo (bsc#1051510).\n- apparmor: fix unsigned len comparison with less than zero (git-fixes).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- arm64: Revert support for execute-only user mappings (bsc#1160218).\n- ata: ahci: Add shutdown to freeze hardware resources of ahci (bsc#1164388).\n- ath10k: Correct the DMA direction for management tx buffers (bsc#1111666).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath10k: pci: Fix comment on ath10k_pci_dump_memory_sram (bsc#1111666).\n- ath10k: pci: Only dump ATH10K_MEM_REGION_TYPE_IOREG when safe (bsc#1111666).\n- ath6kl: Fix off by one error in scan completion (bsc#1051510).\n- ath9k: fix storage endpoint lookup (git-fixes).\n- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).\n- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).\n- batman-adv: Fix DAT candidate selection on little endian systems (bsc#1051510).\n- bcache: Fix an error code in bch_dump_read() (bsc#1163762).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (bsc#1163762, bsc#1112504).\n- bcache: add code comment bch_keylist_pop() and bch_keylist_pop_front() (bsc#1163762).\n- bcache: add code comments for state-\u003epool in __btree_sort() (bsc#1163762).\n- bcache: add code comments in bch_btree_leaf_dirty() (bsc#1163762).\n- bcache: add cond_resched() in __bch_cache_cmp() (bsc#1163762).\n- bcache: add idle_max_writeback_rate sysfs interface (bsc#1163762).\n- bcache: add more accurate error messages in read_super() (bsc#1163762).\n- bcache: add readahead cache policy options via sysfs interface (bsc#1163762).\n- bcache: at least try to shrink 1 node in bch_mca_scan() (bsc#1163762).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (bsc#1163762).\n- bcache: check return value of prio_read() (bsc#1163762).\n- bcache: deleted code comments for dead code in bch_data_insert_keys() (bsc#1163762).\n- bcache: do not export symbols (bsc#1163762).\n- bcache: explicity type cast in bset_bkey_last() (bsc#1163762).\n- bcache: fix a lost wake-up problem caused by mca_cannibalize_lock (bsc#1163762).\n- bcache: fix deadlock in bcache_allocator (bsc#1163762).\n- bcache: fix incorrect data type usage in btree_flush_write() (bsc#1163762).\n- bcache: fix memory corruption in bch_cache_accounting_clear() (bsc#1163762).\n- bcache: fix static checker warning in bcache_device_free() (bsc#1163762).\n- bcache: ignore pending signals when creating gc and allocator thread (bsc#1163762, bsc#1112504).\n- bcache: print written and keys in trace_bcache_btree_write (bsc#1163762).\n- bcache: reap c-\u003ebtree_cache_freeable from the tail in bch_mca_scan() (bsc#1163762).\n- bcache: reap from tail of c-\u003ebtree_cache in bch_mca_scan() (bsc#1163762).\n- bcache: remove macro nr_to_fifo_front() (bsc#1163762).\n- bcache: remove member accessed from struct btree (bsc#1163762).\n- bcache: remove the extra cflags for request.o (bsc#1163762).\n- bcma: remove set but not used variable \u0027sizel\u0027 (git-fixes).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1159377).\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840).\n- blk-mq: make sure that line break can be printed (bsc#1159377).\n- blk-mq: make sure that line break can be printed (bsc#1164098).\n- bnxt: apply computed clamp value for coalece parameter (bsc#1104745).\n- bnxt_en: Fix MSIX request logic for RDMA driver (bsc#1104745 ).\n- bnxt_en: Fix NTUPLE firmware command failures (bsc#1104745 ).\n- bnxt_en: Fix TC queue mapping (networking-stable-20_02_05).\n- bnxt_en: Improve device shutdown method (bsc#1104745 ).\n- bnxt_en: Issue PCIe FLR in kdump kernel to cleanup pending DMAs (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Return error if FW returns more data than dump length (bsc#1104745).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix potential NULL deref in bond_update_slave_arr (bsc#1051510).\n- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).\n- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).\n- bonding: fix unexpected IFF_BONDING bit unset (bsc#1051510).\n- bpf, offload: Replace bitwise AND by logical AND in bpf_prog_offload_info_fill (bsc#1109837).\n- bpf, offload: Unlock on error in bpf_offload_dev_create() (bsc#1109837).\n- bpf/sockmap: Read psock ingress_msg before sk_receive_queue (bsc#1083647).\n- bpf/stackmap: Fix deadlock with rq_lock in bpf_get_stack() (bsc#1083647).\n- bpf: Fix incorrect verifier simulation of ARSH under ALU32 (bsc#1083647).\n- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).\n- bpf: Reject indirect var_off stack access in raw mode (bsc#1160618).\n- bpf: Reject indirect var_off stack access in unpriv mode (bco#1160618).\n- bpf: Sanity check max value for var_off stack access (bco#1160618).\n- bpf: Support variable offset stack access from helpers (bco#1160618).\n- bpf: add self-check logic to liveness analysis (bsc#1160618).\n- bpf: add verifier stats and log_level bit 2 (bsc#1160618).\n- bpf: improve stacksafe state comparison (bco#1160618).\n- bpf: improve verification speed by droping states (bsc#1160618).\n- bpf: improve verification speed by not remarking live_read (bsc#1160618).\n- bpf: improve verifier branch analysis (bsc#1160618).\n- bpf: increase complexity limit and maximum program size (bsc#1160618).\n- bpf: increase verifier log limit (bsc#1160618).\n- bpf: skmsg, fix potential psock NULL pointer dereference (bsc#1109837).\n- bpf: speed up stacksafe check (bco#1160618).\n- bpf: verifier: teach the verifier to reason about the BPF_JSET instruction (bco#1160618).\n- brcmfmac: Fix memory leak in brcmf_p2p_create_p2pdev() (bsc#1111666).\n- brcmfmac: Fix memory leak in brcmf_usbdev_qinit (git-fixes).\n- brcmfmac: Fix use after free in brcmf_sdio_readframes() (git-fixes).\n- brcmfmac: fix interface sanity check (git-fixes).\n- brcmfmac: sdio: Fix OOB interrupt initialization on brcm43362 (bsc#1111666).\n- brcmfmac: set F2 watermark to 256 for 4373 (bsc#1111666).\n- brcmfmac: set SDIO F1 MesBusyCtrl for CYW4373 (bsc#1111666).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it (dependency for bsc#1157692).\n- btrfs: abort transaction after failed inode updates in create_subvol (bsc#1161936).\n- btrfs: dev-replace: remove warning for unknown return codes when finished (dependency for bsc#1162067).\n- btrfs: do not call synchronize_srcu() in inode_tree_del (bsc#1161934).\n- btrfs: do not double lock the subvol_sem for rename exchange (bsc#1162943).\n- btrfs: fix integer overflow in calc_reclaim_items_nr (bsc#1160433).\n- btrfs: handle ENOENT in btrfs_uuid_tree_iterate (bsc#1161937).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: inode: Verify inode mode to avoid NULL pointer dereference (dependency for bsc#1157692).\n- btrfs: record all roots for rename exchange on a subvol (bsc#1161933).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1159588).\n- btrfs: scrub: Require mandatory block group RO for dev-replace (bsc#1162067).\n- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n- btrfs: skip log replay on orphaned roots (bsc#1161935).\n- btrfs: tree-checker: Check chunk item at tree block read time (dependency for bsc#1157692).\n- btrfs: tree-checker: Check level for leaves and nodes (dependency for bsc#1157692).\n- btrfs: tree-checker: Enhance chunk checker to validate chunk profile (dependency for bsc#1157692).\n- btrfs: tree-checker: Fix wrong check on max devid (fixes for dependency of bsc#1157692).\n- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO (dependency for bsc#1157692).\n- btrfs: tree-checker: Make chunk item checker messages more readable (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify dev item (dependency for bsc#1157692).\n- btrfs: tree-checker: Verify inode item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in block_group_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_block_group_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_csum_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dev_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_dir_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_extent_data_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_inode_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf_item (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dev_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in dir_item_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in file_extent_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in check_leaf (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in chunk_err (dependency for bsc#1157692).\n- btrfs: tree-checker: get fs_info from eb in generic_err (dependency for bsc#1157692).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can, slip: Protect tty-\u003edisc_data in write_wakeup and close with RCU (bsc#1051510).\n- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).\n- can: can_dropped_invalid_skb(): ensure an initialized headroom in outgoing CAN sk_buffs (bsc#1051510).\n- can: gs_usb: gs_usb_probe(): use descriptors of current altsetting (bsc#1051510).\n- can: mscan: mscan_rx_poll(): fix rx path lockup when returning from polling to irq mode (bsc#1051510).\n- can: peak_usb: report bus recovery as well (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).\n- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n- cdrom: respect device capabilities during opening action (boo#1164632).\n- cfg80211/mac80211: make ieee80211_send_layer2_update a public function (bsc#1051510).\n- cfg80211: check for set_wiphy_params (bsc#1051510).\n- cfg80211: fix deadlocks in autodisconnect work (bsc#1111666).\n- cfg80211: fix memory leak in cfg80211_cqm_rssi_update (bsc#1111666).\n- cfg80211: fix page refcount issue in A-MSDU decap (bsc#1051510).\n- cgroup: pids: use atomic64_t for pids-\u003elimit (bsc#1161514).\n- chardev: Avoid potential use-after-free in \u0027chrdev_open()\u0027 (bsc#1163849).\n- cifs: Add tracepoints for errors on flush or fsync (bsc#1144333).\n- cifs: Adjust indentation in smb2_open_file (bsc#1144333).\n- cifs: Avoid doing network I/O while holding cache lock (bsc#1144333).\n- cifs: Clean up DFS referral cache (bsc#1144333).\n- cifs: Do not display RDMA transport on reconnect (bsc#1144333).\n- cifs: Fix lookup of root ses in DFS referral cache (bsc#1144333).\n- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- cifs: Fix mode output in debugging statements (bsc#1144333).\n- cifs: Fix mount options set in automount (bsc#1144333).\n- cifs: Fix mount options set in automount (bsc#1144333).\n- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1144333).\n- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1144333).\n- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1144333).\n- cifs: Fix return value in __update_cache_entry (bsc#1144333).\n- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1144333).\n- cifs: Get rid of kstrdup_const()\u0027d paths (bsc#1144333).\n- cifs: Introduce helpers for finding TCP connection (bsc#1144333).\n- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1144333).\n- cifs: Optimize readdir on reparse points (bsc#1144333).\n- cifs: Use #define in cifs_dbg (bsc#1144333).\n- cifs: add SMB2_open() arg to return POSIX data (bsc#1144333).\n- cifs: add SMB3 change notification support (bsc#1144333).\n- cifs: add a debug macro that prints \\\\server\\share for errors (bsc#1144333).\n- cifs: add missing mount option to /proc/mounts (bsc#1144333).\n- cifs: add new debugging macro cifs_server_dbg (bsc#1144333).\n- cifs: add passthrough for smb2 setinfo (bsc#1144333).\n- cifs: add smb2 POSIX info level (bsc#1144333).\n- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1144333).\n- cifs: add support for flock (bsc#1144333).\n- cifs: allow chmod to set mode bits using special sid (bsc#1144333).\n- cifs: call wake_up(\u0026server-\u003eresponse_q) inside of cifs_reconnect() (bsc#1144333).\n- cifs: close the shared root handle on tree disconnect (bsc#1144333).\n- cifs: create a helper function to parse the query-directory response buffer (bsc#1144333).\n- cifs: do d_move in rename (bsc#1144333).\n- cifs: do not ignore the SYNC flags in getattr (bsc#1144333).\n- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1144333).\n- cifs: do not use \u0027pre:\u0027 for MODULE_SOFTDEP (bsc#1144333).\n- cifs: enable change notification for SMB2.1 dialect (bsc#1144333).\n- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1144333).\n- cifs: fix NULL dereference in match_prepath (bsc#1144333).\n- cifs: fix a comment for the timeouts when sending echos (bsc#1144333).\n- cifs: fix dereference on ses before it is null checked (bsc#1144333).\n- cifs: fix mode bits from dir listing when mounted with modefromsid (bsc#1144333).\n- cifs: fix mount option display for sec=krb5i (bsc#1161907).\n- cifs: fix potential mismatch of UNC paths (bsc#1144333).\n- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1144333).\n- cifs: fix soft mounts hanging in the reconnect code (bsc#1144333).\n- cifs: fix soft mounts hanging in the reconnect code (bsc#1144333).\n- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1144333).\n- cifs: get mode bits from special sid on stat (bsc#1144333).\n- cifs: handle prefix paths in reconnect (bsc#1144333).\n- cifs: log warning message (once) if out of disk space (bsc#1144333).\n- cifs: make sure we do not overflow the max EA buffer size (bsc#1144333).\n- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1144333).\n- cifs: modefromsid: make room for 4 ACE (bsc#1144333).\n- cifs: modefromsid: write mode ACE first (bsc#1144333).\n- cifs: plumb smb2 POSIX dir enumeration (bsc#1144333).\n- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1144333).\n- cifs: prepare SMB2_query_directory to be used with compounding (bsc#1144333).\n- cifs: print warning once if mounting with vers=1.0 (bsc#1144333).\n- cifs: remove redundant assignment to pointer pneg_ctxt (bsc#1144333).\n- cifs: remove redundant assignment to variable rc (bsc#1144333).\n- cifs: remove set but not used variable \u0027server\u0027 (bsc#1144333).\n- cifs: remove set but not used variables (bsc#1144333).\n- cifs: remove unused variable \u0027sid_user\u0027 (bsc#1144333).\n- cifs: remove unused variable (bsc#1144333).\n- cifs: rename a variable in SendReceive() (bsc#1144333).\n- cifs: rename posix create rsp (bsc#1144333).\n- cifs: replace various strncpy with strscpy and similar (bsc#1144333).\n- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1144333).\n- cifs: smbd: Add messages on RDMA session destroy and reconnection (bsc#1144333).\n- cifs: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1144333).\n- cifs: smbd: Only queue work for error recovery on memory registration (bsc#1144333).\n- cifs: smbd: Return -EAGAIN when transport is reconnecting (bsc#1144333).\n- cifs: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1144333).\n- cifs: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1144333).\n- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1144333).\n- cifs: use compounding for open and first query-dir for readdir() (bsc#1144333).\n- cifs: use mod_delayed_work() for \u0026server-\u003ereconnect if already queued (bsc#1144333).\n- clk: Do not try to enable critical clocks if prepare failed (bsc#1051510).\n- clk: imx: clk-composite-8m: add lock to gate/mux (git-fixes).\n- clk: mmp2: Fix the order of timer mux parents (bsc#1051510).\n- clk: qcom: rcg2: Do not crash if our parent can\u0027t be found; return an error (bsc#1051510).\n- clk: rockchip: fix I2S1 clock gate register for rk3328 (bsc#1051510).\n- clk: rockchip: fix ID of 8ch clock of I2S1 for rk3328 (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_mac_lbtest parameter ordering (bsc#1051510).\n- clk: rockchip: fix rk3188 sclk_smc gate data (bsc#1051510).\n- clk: sunxi-ng: add mux and pll notifiers for A64 CPU clock (bsc#1051510).\n- clk: sunxi: sun9i-mmc: Implement reset callback for reset controls (bsc#1051510).\n- clk: tegra: Mark fuse clock as critical (bsc#1051510).\n- clocksource/drivers/bcm2835_timer: Fix memory leak of timer (bsc#1051510).\n- clocksource: Prevent double add_timer_on() for watchdog_timer (bsc#1051510).\n- closures: fix a race on wakeup from closure_sync (bsc#1163762).\n- cls_rsvp: fix rsvp_policy (networking-stable-20_02_05).\n- configfs_register_group() shouldn\u0027t be (and isn\u0027t) called in rmdirable parts (bsc#1051510).\n- copy/pasted \u0027Recommends:\u0027 instead of \u0027Provides:\u0027, \u0027Obsoletes:\u0027 and \u0027Conflicts:\n- core: Do not skip generic XDP program execution for cloned SKBs (bsc#1109837).\n- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n- crypto: af_alg - Use bh_lock_sock in sk_destruct (bsc#1051510).\n- crypto: api - Check spawn-\u003ealg under lock in crypto_drop_spawn (bsc#1051510).\n- crypto: api - Fix race condition in crypto_spawn_alg (bsc#1051510).\n- crypto: atmel-sha - fix error handling when setting hmac key (bsc#1051510).\n- crypto: caam/qi2 - fix typo in algorithm\u0027s driver name (bsc#1111666).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: chelsio - fix writing tfm flags to wrong place (bsc#1051510).\n- crypto: dh - add public key verification test (bsc#1155331).\n- crypto: dh - fix calculating encoded key size (bsc#1155331).\n- crypto: dh - fix memory leak (bsc#1155331).\n- crypto: dh - update test for public key verification (bsc#1155331).\n- crypto: ecdh - add public key verification test (bsc#1155331).\n- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).\n- crypto: pcrypt - Do not clear MAY_SLEEP flag in original request (bsc#1051510).\n- crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill (bsc#1051510).\n- crypto: reexport crypto_shoot_alg() (bsc#1051510, kABI fix).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n- devlink: report 0 after hitting end in region read (bsc#1109837).\n- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).\n- dma-mapping: fix return type of dma_set_max_seg_size() (bsc#1051510).\n- dmaengine: Fix access to uninitialized dma_slave_caps (bsc#1051510).\n- dmaengine: coh901318: Fix a double-lock bug (bsc#1051510).\n- dmaengine: coh901318: Remove unused variable (bsc#1051510).\n- drivers/base/memory.c: cache blocks in radix tree to accelerate lookup (bsc#1159955 ltc#182993).\n- drivers/base/memory.c: do not access uninitialized memmaps in soft_offline_page_store() (bsc#1051510).\n- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).\n- drivers/regulator: fix a missing check of return value (bsc#1051510).\n- drm/amd/display: Retrain dongles when SINK_COUNT becomes non-zero (bsc#1111666).\n- drm/amd/powerplay: remove set but not used variable \u0027us_mvdd\u0027 (bsc#1111666).\n- drm/amdgpu/{uvd,vcn}: fetch ring\u0027s read_ptr after alloc (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_device_set_cg_state\u0027 (bsc#1111666).\n- drm/amdgpu: add function parameter description in \u0027amdgpu_gart_bind\u0027 (bsc#1051510).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)\n- drm/amdgpu: fix ring test failure issue during s3 in vce 3.0 (V2) (bsc#1111666).\n- drm/amdgpu: remove 4 set but not used variable in amdgpu_atombios_get_connector_info_from_object_table (bsc#1051510).\n- drm/amdgpu: remove always false comparison in \u0027amdgpu_atombios_i2c_process_i2c_ch\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027amdgpu_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027dig_connector\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027invalid\u0027 (bsc#1111666).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 (bsc#1051510).\n- drm/amdgpu: remove set but not used variable \u0027mc_shared_chmap\u0027 from \u0027gfx_v6_0.c\u0027 and \u0027gfx_v7_0.c\u0027 (bsc#1051510).\n- drm/amdkfd: fix a use after free race with mmu_notifer unregister (bsc#1114279)\n- drm/dp_mst: correct the shifting in DP_REMOTE_I2C_READ (bsc#1051510).\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1114279)\n- drm/fb-helper: Round up bits_per_pixel if possible (bsc#1051510).\n- drm/i810: Prevent underflow in ioctl (bsc#1114279)\n- drm/i915/gvt: Pin vgpu dma address before using (bsc#1112178)\n- drm/i915/gvt: Separate display reset from ALL_ENGINES reset (bsc#1114279)\n- drm/i915/gvt: set guest display buffer as readonly (bsc#1112178)\n- drm/i915/gvt: use vgpu lock for active state setting (bsc#1112178)\n- drm/i915/perf: add missing delay for OA muxes configuration (bsc#1111666).\n- drm/i915/userptr: Try to acquire the page lock around (bsc#1114279)\n- drm/i915/userptr: fix size calculation (bsc#1114279)\n- drm/i915: Add missing include file \u003clinux/math64.h\u003e (bsc#1051510).\n- drm/i915: Call dma_set_max_seg_size() in i915_driver_hw_probe() (bsc#1111666).\n- drm/i915: Fix pid leak with banned clients (bsc#1114279)\n- drm/i915: Handle vm_mmap error during I915_GEM_MMAP ioctl with WC set (bsc#1111666).\n- drm/i915: Make sure cdclk is high enough for DP audio on VLV/CHV (bsc#1111666).\n- drm/i915: Reacquire priolist cache after dropping the engine lock (bsc#1129770) Fixes a const function argument in the patch.\n- drm/i915: Sanity check mmap length against object size (bsc#1111666).\n- drm/i915: Wean off drm_pci_alloc/drm_pci_free (bsc#1114279)\n- drm/mediatek: Add gamma property according to hardware capability (bsc#1114279)\n- drm/mediatek: disable all the planes in atomic_disable (bsc#1114279)\n- drm/mipi_dbi: Fix off-by-one bugs in mipi_dbi_blank() (bsc#1114279)\n- drm/msm: include linux/sched/task.h (bsc#1112178)\n- drm/mst: Fix MST sideband up-reply failure handling (bsc#1051510).\n- drm/nouveau/bar/gf100: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/bar/nv50: check bar1 vmm return value (bsc#1111666).\n- drm/nouveau/mmu: qualify vmm during dtor (bsc#1111666).\n- drm/nouveau/secboot/gm20b: initialize pointer in gm20b_secboot_new() (bsc#1051510).\n- drm/nouveau: Fix copy-paste error in nouveau_fence_wait_uevent_handler (bsc#1051510).\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/qxl: Return error if fbdev is not 32 bpp (bsc#1159028)\n- drm/radeon: fix r1xx/r2xx register checker for POT textures (bsc#1114279)\n- drm/rect: Avoid division by zero (bsc#1111666).\n- drm/rect: update kerneldoc for drm_rect_clip_scaled() (bsc#1111666).\n- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)\n- drm/rockchip: lvds: Fix indentation of a #define (bsc#1051510).\n- drm/sun4i: hdmi: Remove duplicate cleanup calls (bsc#1113956)\n- drm/sun4i: tcon: Set RGB DCLK min. divider based on hardware model (bsc#1111666).\n- drm/sun4i: tcon: Set min division of TCON0_DCLK to 1 (bsc#1111666).\n- drm/ttm: ttm_tt_init_fields() can be static (bsc#1111666).\n- drm/vmwgfx: prevent memory leak in vmw_cmdbuf_res_add (bsc#1051510).\n- drm: atmel-hlcdc: enable clock before configuring timing engine (bsc#1114279)\n- drm: bridge: dw-hdmi: constify copied structure (bsc#1051510).\n- drm: limit to INT_MAX in create_blob ioctl (bsc#1051510).\n- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n- drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable (bsc#1111666).\n- drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable (bsc#1114279)\n- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)\n- drm: rcar-du: Recognize \u0027renesas,vsps\u0027 in addition to \u0027vsps\u0027 (bsc#1114279)\n- e1000e: Add support for Comet Lake (bsc#1158533).\n- e1000e: Add support for Tiger Lake (bsc#1158533).\n- e1000e: Increase pause and refresh time (bsc#1158533).\n- e100: Fix passing zero to \u0027PTR_ERR\u0027 warning in e100_load_ucode_wait (bsc#1051510).\n- enic: prevent waking up stopped tx queues over watchdog reset (bsc#1133147).\n- ethtool: Factored out similar ethtool link settings for virtual devices to core (bsc#1136157 ltc#177197).\n- exit: panic before exit_mm() on global init exit (bsc#1161549).\n- ext2: check err when partial != NULL (bsc#1163859).\n- ext4, jbd2: ensure panic when aborting with zero errno (bsc#1163853).\n- ext4: Fix mount failure with quota configured as module (bsc#1164471).\n- ext4: check for directory entries too close to block end (bsc#1163861).\n- ext4: fix a bug in ext4_wait_for_tail_page_commit (bsc#1163841).\n- ext4: fix checksum errors with indexed dirs (bsc#1160979).\n- ext4: fix deadlock allocating crypto bounce page from mempool (bsc#1163842).\n- ext4: fix mount failure with quota configured as module (bsc#1164471).\n- ext4: improve explanation of a mount failure caused by a misconfigured kernel (bsc#1163843).\n- extcon: max8997: Fix lack of path setting in USB device mode (bsc#1051510).\n- firestream: fix memory leaks (bsc#1051510).\n- fix autofs regression caused by follow_managed() changes (bsc#1159271).\n- fix dget_parent() fastpath race (bsc#1159271).\n- fix memory leak in large read decrypt offload (bsc#1144333).\n- fjes: fix missed check in fjes_acpi_add (bsc#1051510).\n- fs/cifs/cifssmb.c: use true,false for bool variable (bsc#1144333).\n- fs/cifs/sess.c: Remove set but not used variable \u0027capabilities\u0027 (bsc#1144333).\n- fs/cifs/smb2ops.c: use true,false for bool variable (bsc#1144333).\n- fs/cifs/smb2pdu.c: Make SMB2_notify_init static (bsc#1144333).\n- fs/namei.c: fix missing barriers when checking positivity (bsc#1159271).\n- fs/namei.c: pull positivity check into follow_managed() (bsc#1159271).\n- fs/open.c: allow opening only regular files during execve() (bsc#1163845).\n- fs: cifs: Fix atime update check vs mtime (bsc#1144333).\n- fs: cifs: Initialize filesystem timestamp ranges (bsc#1144333).\n- fs: cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1144333).\n- fs: cifs: mute -Wunused-const-variable message (bsc#1144333).\n- fscrypt: do not set policy for a dead directory (bsc#1163846).\n- ftrace: Add comment to why rcu_dereference_sched() is open coded (git-fixes).\n- ftrace: Avoid potential division by zero in function profiler (bsc#1160784).\n- ftrace: Protect ftrace_graph_hash with ftrace_sync (git-fixes).\n- genirq/proc: Return proper error code when irq_set_affinity() fails (bnc#1105392).\n- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n- gpio: Fix error message on out-of-range GPIO in lookup table (bsc#1051510).\n- gtp: avoid zero size hashtable (networking-stable-20_01_01).\n- gtp: do not allow adding duplicate tid and ms_addr pdp context (networking-stable-20_01_01).\n- gtp: fix an use-after-free in ipv4_pdp_find() (networking-stable-20_01_01).\n- gtp: fix wrong condition in gtp_genl_dump_pdp() (networking-stable-20_01_01).\n- gtp: make sure only SOCK_DGRAM UDP sockets are accepted (networking-stable-20_01_27).\n- gtp: use __GFP_NOWARN to avoid memalloc warning (networking-stable-20_02_05).\n- hidraw: Return EPOLLOUT from hidraw_poll (bsc#1051510).\n- hotplug/drc-info: Add code to search ibm,drc-info property (bsc#1157480 ltc#181028).\n- hv_netvsc: Fix memory leak when removing rndis device (networking-stable-20_01_20).\n- hv_netvsc: Fix offset usage in netvsc_send_table() (bsc#1164598).\n- hv_netvsc: Fix send_table offset in case of a host bug (bsc#1164598).\n- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1164598).\n- hv_netvsc: Fix unwanted rx_table reset (bsc#1164598).\n- hwmon: (adt7475) Make volt2reg return same reg as reg2volt input (bsc#1051510).\n- hwmon: (core) Do not use device managed functions for memory allocations (bsc#1051510).\n- hwmon: (k10temp) Add support for AMD family 17h, model 70h CPUs (bsc#1163206).\n- hwmon: (nct7802) Fix voltage limits to wrong registers (bsc#1051510).\n- hwmon: (pmbus/ltc2978) Fix PMBus polling of MFR_COMMON definitions (bsc#1051510).\n- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).\n- i2c: imx: do not print error message on probe defer (bsc#1051510).\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ice: fix stack leakage (bsc#1118661).\n- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).\n- iio: adc: max9611: Fix too short conversion time delay (bsc#1051510).\n- iio: buffer: align the size of scan bytes to size of the largest element (bsc#1051510).\n- inet: protect against too small mtu values (networking-stable-19_12_16).\n- iommu/amd: Fix IOMMU perf counter clobbering during init (bsc#1162617).\n- iommu/arm-smmu-v3: Populate VMID field for CMDQ_OP_TLBI_NH_VA (bsc#1164314).\n- iommu/io-pgtable-arm: Fix race handling in split_blk_unmap() (bsc#1164115).\n- iommu/iova: Init the struct iova to fix the possible memleak (bsc#1160469).\n- iommu/mediatek: Correct the flush_iotlb_all callback (bsc#1160470).\n- iommu/vt-d: Unlink device if failed to add to group (bsc#1160756).\n- iommu: Remove device link to group on failure (bsc#1160755).\n- ipmi: Do not allow device module unload when in use (bsc#1154768).\n- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).\n- ipv4: ensure rcu_read_lock() in cipso_v4_error() (git-fixes).\n- ipv6: restrict IPV6_ADDRFORM operation (bsc#1109837).\n- iwlegacy: ensure loop counter addr does not wrap and cause an infinite loop (git-fixes).\n- iwlwifi: change monitor DMA to be coherent (bsc#1161243).\n- iwlwifi: clear persistence bit according to device family (bsc#1111666).\n- iwlwifi: do not throw error when trying to remove IGTK (bsc#1051510).\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: fix NVM check for 3168 devices (bsc#1051510).\n- iwlwifi: mvm: force TCM re-evaluation on TCM resume (bsc#1111666).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- iwlwifi: pcie: fix erroneous print (bsc#1111666).\n- iwlwifi: trans: Clear persistence bit when starting the FW (bsc#1111666).\n- jbd2: Fix possible overflow in jbd2_log_space_left() (bsc#1163860).\n- jbd2: clear JBD2_ABORT flag before journal_reset to update log tail info when load journal (bsc#1163862).\n- jbd2: do not clear the BH_Mapped flag when forgetting a metadata buffer (bsc#1163836).\n- jbd2: make sure ESHUTDOWN to be recorded in the journal superblock (bsc#1163863).\n- jbd2: move the clearing of b_modified flag to the journal_unmap_buffer() (bsc#1163880).\n- jbd2: switch to use jbd2_journal_abort() when failed to submit the commit record (bsc#1163852).\n- kABI fix for \u0027ipmi: Do not allow device module unload when in use\u0027 (bsc#1154768).\n- kABI fixup for alloc_dax_region (bsc#1158071,bsc#1160678).\n- kABI workaround for can/skb.h inclusion (bsc#1051510).\n- crypto/dh: Make sure the FIPS pubkey check is only executed in FIPS mode.\n- kABI: Protest new fields in BPF structs (bsc#1160618).\n- kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n- kABI: protect struct sctp_ep_common (kabi).\n- kabi/severities: Whitelist rpaphp_get_drc_props (bsc#1157480 ltc#181028).\n- kconfig: fix broken dependency in randconfig-generated .config (bsc#1051510).\n- kernel-binary.spec.in: do not recommend firmware for kvmsmall and azure flavor (boo#1161360).\n- kernel/module.c: Only return -EEXIST for modules that have finished loading (bsc#1165488).\n- kernel/module.c: wakeup processes in module_wq on module unload (bsc#1165488).\n- kernel/trace: Fix do not unregister tracepoints when register sched_migrate_task fail (bsc#1160787).\n- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n- kexec: bail out upon SIGKILL when allocating memory (git-fixes).\n- kvm: x86: Host feature SSBD does not imply guest feature SPEC_CTRL_SSBD (bsc#1160476).\n- l2tp: Allow duplicate session creation with UDP (networking-stable-20_02_05).\n- lcoking/rwsem: Add missing ACQUIRE to read_slowpath sleep loop (bsc#1050549).\n- leds: Allow to call led_classdev_unregister() unconditionally (bsc#1161674).\n- leds: class: ensure workqueue is initialized before setting brightness (bsc#1161674).\n- lib/scatterlist.c: adjust indentation in __sg_alloc_table (bsc#1051510).\n- lib/test_kasan.c: fix memory leak in kmalloc_oob_krealloc_more() (bsc#1051510).\n- lib: crc64: include \u003clinux/crc64.h\u003e for \u0027crc64_be\u0027 (bsc#1163762).\n- libnvdimm-fix-devm_nsio_enable-kabi.patch: Fixup compiler warning\n- libnvdimm/namespace: Differentiate between probe mapping and runtime mapping (bsc#1153535).\n- libnvdimm/pfn: Account for PAGE_SIZE \u003e info-block-size in nd_pfn_init() (bsc#1127682 bsc#1153535 ltc#175033 ltc#181834).\n- libnvdimm: Fix devm_nsio_enable() kabi (bsc#1153535).\n- livepatch/samples/selftest: Use klp_shadow_alloc() API correctly (bsc#1071995).\n- livepatch/selftest: Clean up shadow variable names and type (bsc#1071995).\n- locking/rwsem: Prevent decrement of reader count before increment (bsc#1050549).\n- mac80211: Do not send Layer 2 Update frame before authorization (bsc#1051510).\n- mac80211: Fix TKIP replay protection immediately after key setup (bsc#1051510).\n- mac80211: fix ieee80211_txq_setup_flows() failure path (bsc#1111666).\n- mac80211: fix station inactive_time shortly after boot (bsc#1051510).\n- mac80211: mesh: restrict airtime metric to peered established plinks (bsc#1051510).\n- macvlan: do not assume mac_header is set in macvlan_broadcast() (bsc#1051510).\n- macvlan: use skb_reset_mac_header() in macvlan_queue_xmit() (bsc#1051510).\n- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).\n- md/raid0: Fix buffer overflow at debug print (bsc#1164051).\n- media/v4l2-core: set pages dirty upon releasing DMA buffers (bsc#1051510).\n- media: af9005: uninitialized variable printked (bsc#1051510).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: CEC 2.0-only bcast messages were ignored (git-fixes).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: digitv: do not continue if remote control state can\u0027t be read (bsc#1051510).\n- media: dvb-usb/dvb-usb-urb.c: initialize actlen to 0 (bsc#1051510).\n- media: exynos4-is: fix wrong mdev and v4l2 dev order in error path (git-fixes).\n- media: gspca: zero usb_buf (bsc#1051510).\n- media: iguanair: fix endpoint sanity check (bsc#1051510).\n- media: ov6650: Fix control handler not freed on init error (git-fixes).\n- media: ov6650: Fix crop rectangle alignment not passed back (git-fixes).\n- media: ov6650: Fix incorrect use of JPEG colorspace (git-fixes).\n- media: pulse8-cec: fix lost cec_transmit_attempt_done() call.\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: uvcvideo: Avoid cyclic entity chains due to malformed USB descriptors (bsc#1051510).\n- media: uvcvideo: Fix error path in control parsing failure (git-fixes).\n- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).\n- media: v4l2-ioctl.c: zero reserved fields for S/TRY_FMT (bsc#1051510).\n- media: v4l2-rect.h: fix v4l2_rect_map_inside() top/left adjustments (bsc#1051510).\n- mei: bus: prefix device names on bus with the bus name (bsc#1051510).\n- mfd: da9062: Fix watchdog compatible string (bsc#1051510).\n- mfd: dln2: More sanity checking for endpoints (bsc#1051510).\n- mfd: rn5t618: Mark ADC control register volatile (bsc#1051510).\n- missing escaping of backslashes in macro expansions (bsc#1143959)\n- mlxsw: spectrum: Wipe xstats.backlog of down ports (bsc#1112374).\n- mlxsw: spectrum_qdisc: Ignore grafting of invisible FIFO (bsc#1112374).\n- mlxsw: spectrum_qdisc: Include MC TCs in Qdisc counters (bsc#1112374).\n- mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel (bsc#1112374).\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).\n- mm/page-writeback.c: fix range_cyclic writeback vs writepages deadlock (bsc#1159394).\n- mm: memory_hotplug: use put_device() if device_register fail (bsc#1159955 ltc#182993).\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: sdhci-of-esdhc: Revert \u0027mmc: sdhci-of-esdhc: add erratum A-009204 support\u0027 (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci: Add a quirk for broken command queuing (git-fixes).\n- mmc: sdhci: Workaround broken command queuing on Intel GLK (git-fixes).\n- mmc: sdhci: fix minimum clock rate for v3 controller (bsc#1051510).\n- mmc: spi: Toggle SPI polarity, do not hardcode it (bsc#1051510).\n- mmc: tegra: fix SDR50 tuning override (bsc#1051510).\n- mod_devicetable: fix PHY module format (networking-stable-19_12_28).\n- moduleparam: fix parameter description mismatch (bsc#1051510).\n- mqprio: Fix out-of-bounds access in mqprio_dump (bsc#1109837).\n- mtd: fix mtd_oobavail() incoherent returned value (bsc#1051510).\n- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).\n- mwifiex: delete unused mwifiex_get_intf_num() (bsc#1111666).\n- mwifiex: drop most magic numbers from mwifiex_process_tdls_action_frame() (git-fixes).\n- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).\n- mwifiex: update set_mac_address logic (bsc#1111666).\n- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1163851).\n- net, ip6_tunnel: fix namespaces move (networking-stable-20_01_27).\n- net, ip_tunnel: fix namespaces move (networking-stable-20_01_27).\n- net, sysctl: Fix compiler warning when only cBPF is present (bsc#1109837).\n- net-sysfs: Fix reference count leak (networking-stable-20_01_27).\n- net/ethtool: Introduce link_ksettings API for virtual network devices (bsc#1136157 ltc#177197).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- net/mlx4_en: Fix wrong limitation for number of TX rings (bsc#1103989).\n- net/mlx4_en: fix mlx4 ethtool -N insertion (networking-stable-19_11_25).\n- net/mlx5: Accumulate levels for chains prio namespaces (bsc#1103990).\n- net/mlx5: Fix lowest FDB pool size (bsc#1103990).\n- net/mlx5: IPsec, Fix esp modify function attribute (bsc#1103990 ).\n- net/mlx5: IPsec, fix memory leak at mlx5_fpga_ipsec_delete_sa_ctx (bsc#1103990).\n- net/mlx5: Update the list of the PCI supported devices (bsc#1127611).\n- net/mlx5: Update the list of the PCI supported devices (bsc#1127611).\n- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n- net/mlx5e: Fix set vf link state error flow (networking-stable-19_11_25).\n- net/mlx5e: Query global pause state before setting prio2buffer (bsc#1103990).\n- net/mlxfw: Fix out-of-memory error in mfa2 flash burning (bsc#1051858).\n- net/mlxfw: Verify FSM error code translation does not exceed array size (bsc#1051858).\n- net/sched: act_pedit: fix WARN() in the traffic path (networking-stable-19_11_25).\n- net/tls: fix async operation (bsc#1109837).\n- net/tls: free the record on encryption error (bsc#1109837).\n- net/tls: take into account that bpf_exec_tx_verdict() may free the record (bsc#1109837).\n- net/wan/fsl_ucc_hdlc: fix out of bounds write on array utdm_info (networking-stable-20_01_20).\n- net: Fix Tx hash bound checking (bsc#1109837).\n- net: add sendmsg_locked and sendpage_locked to af_inet6 (bsc#1144162).\n- net: bridge: deny dev_set_mac_address() when unregistering (networking-stable-19_12_16).\n- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n- net: cxgb3_main: Add CAP_NET_ADMIN check to CHELSIO_GET_MEM (networking-stable-20_01_27).\n- net: dsa: mv88e6xxx: Preserve priority when setting CPU port (networking-stable-20_01_11).\n- net: dsa: tag_qca: fix doubled Tx statistics (networking-stable-20_01_20).\n- net: dst: Force 4-byte alignment of dst_metrics (networking-stable-19_12_28).\n- net: ena: fix napi handler misbehavior when the napi budget is zero (networking-stable-20_01_01).\n- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).\n- net: ethernet: ti: cpsw: fix extra rx interrupt (networking-stable-19_12_16).\n- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n- net: hisilicon: Fix a BUG trigered by wrong bytes_compl (networking-stable-19_12_28).\n- net: hns3: fix ETS bandwidth validation bug (bsc#1104353 ).\n- net: hns3: fix a copying IPv6 address error in hclge_fd_get_flow_tuples() (bsc#1104353).\n- net: hns: fix soft lockup when there is not enough memory (networking-stable-20_01_20).\n- net: hsr: fix possible NULL deref in hsr_handle_frame() (networking-stable-20_02_05).\n- net: ip6_gre: fix moving ip6gre between namespaces (networking-stable-20_01_27).\n- net: nfc: nci: fix a possible sleep-in-atomic-context bug in nci_uart_tty_receive() (networking-stable-19_12_28).\n- net: phy: Check against net_device being NULL (bsc#1051510).\n- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).\n- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).\n- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).\n- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: marvell: clear wol event before setting it (bsc#1051510).\n- net: phy: meson-gxl: check phy_write return value (bsc#1051510).\n- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: mscc: read \u0027vsc8531, edge-slowdown\u0027 as an u32 (bsc#1051510).\n- net: phy: mscc: read \u0027vsc8531,vddmac\u0027 as an u32 (bsc#1051510).\n- net: phy: xgene: disable clk on error paths (bsc#1051510).\n- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).\n- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).\n- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).\n- net: psample: fix skb_over_panic (networking-stable-19_12_03).\n- net: qlogic: Fix error paths in ql_alloc_large_buffers() (networking-stable-19_12_28).\n- net: rtnetlink: prevent underflows in do_setvfinfo() (networking-stable-19_11_25).\n- net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link() (networking-stable-20_01_27).\n- net: sch_prio: When ungrafting, replace with FIFO (networking-stable-20_01_11).\n- net: sched: correct flower port blocking (git-fixes).\n- net: sched: ensure opts_len \u003c= IP_TUNNEL_OPTS_MAX in act_tunnel_key (bsc#1109837).\n- net: sched: fix `tc -s class show` no bstats on class with nolock subqueues (networking-stable-19_12_03).\n- net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues (bsc#1109837).\n- net: stmmac: Delete txtimer in suspend() (networking-stable-20_02_05).\n- net: stmmac: dwmac-sunxi: Allow all RGMII modes (networking-stable-20_01_11).\n- net: usb: lan78xx: Add .ndo_features_check (networking-stable-20_01_27).\n- net: usb: lan78xx: Fix suspend/resume PHY register access error (networking-stable-19_12_28).\n- net: usb: lan78xx: fix possible skb leak (networking-stable-20_01_11).\n- net: usb: lan78xx: limit size of local TSO packets (bsc#1051510).\n- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).\n- net: usb: qmi_wwan: add support for Foxconn T77W968 LTE modules (networking-stable-19_11_18).\n- net_sched: ematch: reject invalid TCF_EM_SIMPLE (networking-stable-20_01_30).\n- net_sched: fix an OOB access in cls_tcindex (networking-stable-20_02_05).\n- net_sched: fix datalen for ematch (networking-stable-20_01_27).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- new helper: lookup_positive_unlocked() (bsc#1159271).\n- nvme: fix the parameter order for nvme_get_log in nvme_get_fw_slot_info (bsc#1163774).\n- openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info() (networking-stable-19_12_03).\n- openvswitch: remove another BUG_ON() (networking-stable-19_12_03).\n- openvswitch: support asymmetric conntrack (networking-stable-19_12_16).\n- orinoco_usb: fix interface sanity check (git-fixes).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1114279).\n- perf/x86/intel: Fix inaccurate period in context switch for auto-reload (bsc#1164315).\n- phy: qualcomm: Adjust indentation in read_poll_timeout (bsc#1051510).\n- pinctrl: cherryview: Fix irq_valid_mask calculation (bsc#1111666).\n- pinctrl: qcom: ssbi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix duplicate SDSELF_B and SD1_CLK_B (bsc#1051510).\n- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).\n- pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM (networking-stable-20_01_11).\n- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).\n- platform/mellanox: fix potential deadlock in the tmfifo driver (bsc#1136333 jsc#SLE-4994).\n- platform/x86: asus-wmi: Fix keyboard brightness cannot be set to 0 (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- power: supply: ltc2941-battery-gauge: fix use-after-free (bsc#1051510).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc/irq: fix stack overflow verification (bsc#1065729).\n- powerpc/mm: Remove kvm radix prefetch workaround for Power9 DD2.2 (bsc#1061840).\n- powerpc/mm: drop #ifdef CONFIG_MMU in is_ioremap_addr() (bsc#1065729).\n- powerpc/papr_scm: Do not enable direct map for a region by default (bsc#1129551).\n- powerpc/papr_scm: Fix leaking \u0027bus_desc.provider_name\u0027 in some paths (bsc#1142685 ltc#179509).\n- powerpc/pkeys: remove unused pkey_allows_readwrite (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/pseries/hotplug-memory: Change rc variable to bool (bsc#1065729).\n- powerpc/pseries/lparcfg: Fix display of Maximum Memory (bsc#1162028 ltc#181740).\n- powerpc/pseries/memory-hotplug: Only update DT once per memory DLPAR request (bsc#1165404 ltc#183498).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/pseries/vio: Fix iommu_table use-after-free refcount warning (bsc#1065729).\n- powerpc/pseries: Add cpu DLPAR support for drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Advance pfn if section is not present in lmb_is_removable() (bsc#1065729).\n- powerpc/pseries: Allow not having ibm, hypertas-functions::hcall-multi-tce for DDW (bsc#1065729).\n- powerpc/pseries: Avoid NULL pointer dereference when drmem is unavailable (bsc#1160659).\n- powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init() (git-fixes).\n- powerpc/pseries: Enable support for ibm,drc-info property (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix bad drc_index_start value parsing of drc-info entry (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix drc-info mappings of logical cpus to drc-index (bsc#1157480 ltc#181028).\n- powerpc/pseries: Fix vector5 in ibm architecture vector table (bsc#1157480 ltc#181028).\n- powerpc/pseries: Revert support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc/pseries: group lmb operation and memblock\u0027s (bsc#1165404 ltc#183498).\n- powerpc/pseries: update device tree before ejecting hotplug uevents (bsc#1165404 ltc#183498).\n- powerpc/security: Fix debugfs data leak on 32-bit (bsc#1065729).\n- powerpc/smp: Use nid as fallback for package_id (bsc#1165813 ltc#184091).\n- powerpc/tm: Fix clearing MSR[TS] in current when reclaiming on signal delivery (bsc#1118338 ltc#173734).\n- powerpc/tools: Do not quote $objdump in scripts (bsc#1065729).\n- powerpc/xive: Discard ESB load value when interrupt is invalid (bsc#1085030).\n- powerpc/xive: Skip ioremap() of ESB pages for LSI interrupts (bsc#1085030).\n- powerpc/xmon: do not access ASDR in VMs (bsc#1065729).\n- powerpc: Allow 64bit VDSO __kernel_sync_dicache to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Allow flush_icache_range to work across ranges \u003e4GB (bnc#1151927 5.3.17).\n- powerpc: Enable support for ibm,drc-info devtree property (bsc#1157480 ltc#181028).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- powerpc: avoid adjusting memory_limit for capture kernel memory reservation (bsc#1140025 ltc#176086).\n- powerpc: reserve memory for capture kernel after hugepages init (bsc#1140025 ltc#176086).\n- ppp: Adjust indentation into ppp_async_input (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- pseries/drc-info: Search DRC properties for CPU indexes (bsc#1157480 ltc#181028).\n- pstore/ram: Write new dumps to start of recycled zones (bsc#1051510).\n- ptr_ring: add include of linux/mm.h (bsc#1109837).\n- pwm: Clear chip_data in pwm_put() (bsc#1051510).\n- pwm: Remove set but not set variable \u0027pwm\u0027 (git-fixes).\n- pwm: clps711x: Fix period calculation (bsc#1051510).\n- pwm: omap-dmtimer: Remove PWM chip in .remove before making it unfunctional (git-fixes).\n- pxa168fb: Fix the function used to release some memory in an error (bsc#1114279)\n- qede: Disable hardware gro when xdp prog is installed (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qede: Fix multicast mac configuration (networking-stable-19_12_28).\n- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).\n- qmi_wwan: Add support for Quectel RM500Q (bsc#1051510).\n- quota: Check that quota is not dirty before release (bsc#1163858).\n- quota: fix livelock in dquot_writeback_dquots (bsc#1163857).\n- r8152: add missing endpoint sanity check (bsc#1051510).\n- r8152: get default setting of WOL before initializing (bsc#1051510).\n- random: move FIPS continuous test to output functions (bsc#1155334).\n- regulator: Fix return value of _set_load() stub (bsc#1051510).\n- regulator: rk808: Lower log level on optional GPIOs being not available (bsc#1051510).\n- regulator: rn5t618: fix module aliases (bsc#1051510).\n- regulator: tps65910: fix a missing check of return value (bsc#1051510).\n- reiserfs: Fix memory leak of journal device string (bsc#1163867).\n- reiserfs: Fix spurious unlock in reiserfs_fill_super() error handling (bsc#1163869).\n- reset: fix reset_control_ops kerneldoc comment (bsc#1051510).\n- resource: fix locking in find_next_iomem_res() (bsc#1114279).\n- rpm/kabi.pl: support new (\u003e=5.4) Module.symvers format (new symbol namespace field)\n- rpm/kernel-binary.spec.in: Conflict with too old powerpc-utils (jsc#ECO-920, jsc#SLE-11054, jsc#SLE-11322).\n- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages\n- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n- rpm/modules.fips: update module list (bsc#1157853)\n- rsi_91x_usb: fix interface sanity check (git-fixes).\n- rtc: cmos: Stop using shared IRQ (bsc#1051510).\n- rtc: dt-binding: abx80x: fix resistance scale (bsc#1051510).\n- rtc: hym8563: Return -EINVAL if the time is known to be invalid (bsc#1051510).\n- rtc: max8997: Fix the returned value in case of error in \u0027max8997_rtc_read_alarm()\u0027 (bsc#1051510).\n- rtc: msm6242: Fix reading of 10-hour digit (bsc#1051510).\n- rtc: pcf8523: set xtal load capacitance from DT (bsc#1051510).\n- rtc: s35390a: Change buf\u0027s type to u8 in s35390a_init (bsc#1051510).\n- rtl818x: fix potential use after free (bsc#1051510).\n- rtl8xxxu: fix interface sanity check (git-fixes).\n- rtlwifi: Fix MAX MPDU of VHT capability (git-fixes).\n- rtlwifi: Remove redundant semicolon in wifi.h (git-fixes).\n- rtlwifi: rtl8192de: Fix missing callback that tests for hw release of buffer (bsc#1111666).\n- rxrpc: Fix insufficient receive notification generation (networking-stable-20_02_05).\n- s390/qeth: clean up page frag creation (git-fixes).\n- s390/qeth: consolidate skb allocation (git-fixes).\n- s390/qeth: ensure linear access to packet headers (git-fixes).\n- s390/qeth: guard against runt packets (git-fixes).\n- sched/fair: Add tmp_alone_branch assertion (bnc#1156462).\n- sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).\n- sched/fair: Fix insertion in rq-\u003eleaf_cfs_rq_list (bnc#1156462).\n- sched/fair: Optimize update_blocked_averages() (bnc#1156462).\n- sched/fair: WARN() and refuse to set buddy when !se-\u003eon_rq (bsc#1158132).\n- scsi-qla2xxx-Fix-qla2x00_request_irqs-for-MSI.patch\n- scsi-qla2xxx-fix-rports-not-being-mark-as-lost-in-sy.patch\n- scsi-qla2xxx-unregister-ports-after-GPN_FT-failure.patch\n- scsi: fnic: do not queue commands during fwreset (bsc#1146539).\n- scsi: ibmvfc: Add failed PRLI to cmd_status lookup array (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Byte swap status and error codes when logging (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Clean up transport events (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Do not call fc_block_scsi_eh() on host reset (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Mark expected switch fall-throughs (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Remove \u0027failed\u0027 from logged errors (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Remove unneeded semicolons (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: constify dev_pm_ops structures (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: ibmvscsi: ibmvscsi_tgt: constify vio_device_id (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: Do not use rc uninitialized in ibmvscsi_do_work (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: Improve strings handling (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: Wire up host_reset() in the driver\u0027s scsi_host_template (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: change strncpy+truncation to strlcpy (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: constify dev_pm_ops structures (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: fix tripping of blk_mq_run_hw_queue WARN_ON (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: redo driver work thread to use enum action states (bsc#1161951 ltc#183551).\n- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1154601).\n- scsi: qla2xxx: Add 16.0GT for PCI String (bsc#1157424).\n- scsi: qla2xxx: Add D-Port Diagnostic reason explanation logs (bsc#1158013).\n- scsi: qla2xxx: Add a shadow variable to hold disc_state history of fcport (bsc#1158013).\n- scsi: qla2xxx: Add beacon LED config sysfs interface (bsc#1157424).\n- scsi: qla2xxx: Add changes in preparation for vendor extended FDMI/RDP (bsc#1157424).\n- scsi: qla2xxx: Add deferred queue for processing ABTS and RDP (bsc#1157424).\n- scsi: qla2xxx: Add endianizer macro calls to fc host stats (bsc#1157424).\n- scsi: qla2xxx: Add fixes for mailbox command (bsc#1157424).\n- scsi: qla2xxx: Add ql2xrdpenable module parameter for RDP (bsc#1157424).\n- scsi: qla2xxx: Add sysfs node for D-Port Diagnostics AEN data (bsc#1157424).\n- scsi: qla2xxx: Add vendor extended FDMI commands (bsc#1157424).\n- scsi: qla2xxx: Add vendor extended RDP additions and amendments (bsc#1157424).\n- scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options (bsc#1157424).\n- scsi: qla2xxx: Check locking assumptions at runtime in qla2x00_abort_srb() (bsc#1157424).\n- scsi: qla2xxx: Cleanup ELS/PUREX iocb fields (bsc#1157424).\n- scsi: qla2xxx: Cleanup unused async_logout_done (bsc#1158013).\n- scsi: qla2xxx: Consolidate fabric scan (bsc#1158013).\n- scsi: qla2xxx: Convert MAKE_HANDLE() from a define into an inline function (bsc#1157424).\n- scsi: qla2xxx: Correct fcport flags handling (bsc#1158013).\n- scsi: qla2xxx: Correction to selection of loopback/echo test (bsc#1157424).\n- scsi: qla2xxx: Correctly retrieve and interpret active flash region (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Display message for FCE enabled (bsc#1157424).\n- scsi: qla2xxx: Fix FCP-SCSI FC4 flag passing error (bsc#1157424).\n- scsi: qla2xxx: Fix NPIV instantiation after FW dump (bsc#1157424).\n- scsi: qla2xxx: Fix RDP respond data format (bsc#1157424).\n- scsi: qla2xxx: Fix RDP response size (bsc#1157424).\n- scsi: qla2xxx: Fix RIDA Format-2 (bsc#1158013).\n- scsi: qla2xxx: Fix a NULL pointer dereference in an error path (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix control flags for login/logout IOCB (bsc#1157424).\n- scsi: qla2xxx: Fix fabric scan hang (bsc#1158013).\n- scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix mtcp dump collection failure (bsc#1158013).\n- scsi: qla2xxx: Fix qla2x00_echo_test() based on ISP type (bsc#1157424).\n- scsi: qla2xxx: Fix sparse warning reported by kbuild bot (bsc#1157424).\n- scsi: qla2xxx: Fix sparse warnings triggered by the PCI state checking code (bsc#1157424).\n- scsi: qla2xxx: Fix stuck login session using prli_pend_timer (bsc#1158013).\n- scsi: qla2xxx: Fix stuck session in GNL (bsc#1158013).\n- scsi: qla2xxx: Fix the endianness of the qla82xx_get_fw_size() return type (bsc#1158013).\n- scsi: qla2xxx: Fix unbound NVME response length (bsc#1157966 bsc#1158013 bsc#1157424).\n- scsi: qla2xxx: Fix update_fcport for current_topology (bsc#1158013).\n- scsi: qla2xxx: Force semaphore on flash validation failure (bsc#1157424).\n- scsi: qla2xxx: Handle NVME status iocb correctly (bsc#1157424).\n- scsi: qla2xxx: Handle cases for limiting RDP response payload length (bsc#1157424).\n- scsi: qla2xxx: Improve readability of the code that handles qla_flt_header (bsc#1158013).\n- scsi: qla2xxx: Improved secure flash support messages (bsc#1157424).\n- scsi: qla2xxx: Move free of fcport out of interrupt context (bsc#1157424).\n- scsi: qla2xxx: Print portname for logging in qla24xx_logio_entry() (bsc#1157424).\n- scsi: qla2xxx: Remove defer flag to indicate immeadiate port loss (bsc#1158013).\n- scsi: qla2xxx: Remove restriction of FC T10-PI and FC-NVMe (bsc#1157424).\n- scsi: qla2xxx: Return appropriate failure through BSG Interface (bsc#1157424).\n- scsi: qla2xxx: Save rscn_gen for new fcport (bsc#1157424).\n- scsi: qla2xxx: Serialize fc_port alloc in N2N (bsc#1157424).\n- scsi: qla2xxx: Set Nport ID for N2N (bsc#1157424).\n- scsi: qla2xxx: Show correct port speed capabilities for RDP command (bsc#1157424).\n- scsi: qla2xxx: Simplify the code for aborting SCSI commands (bsc#1157424).\n- scsi: qla2xxx: Suppress endianness complaints in qla2x00_configure_local_loop() (bsc#1157424).\n- scsi: qla2xxx: Update BPM enablement semantics (bsc#1157424).\n- scsi: qla2xxx: Update driver version to 10.01.00.22-k (bsc#1158013).\n- scsi: qla2xxx: Update driver version to 10.01.00.24-k (bsc#1157424).\n- scsi: qla2xxx: Update driver version to 10.01.00.25-k (bsc#1157424).\n- scsi: qla2xxx: Use FC generic update firmware options routine for ISP27xx (bsc#1157424).\n- scsi: qla2xxx: Use QLA_FW_STOPPED macro to propagate flag (bsc#1157424).\n- scsi: qla2xxx: Use a dedicated interrupt handler for \u0027handshake-required\u0027 ISPs (bsc#1157424).\n- scsi: qla2xxx: Use common routine to free fcport struct (bsc#1158013).\n- scsi: qla2xxx: Use correct ISP28xx active FW region (bsc#1157424).\n- scsi: qla2xxx: Use endian macros to assign static fields in fwdump header (bsc#1157424).\n- scsi: qla2xxx: Use get_unaligned_*() instead of open-coding these functions (bsc#1158013).\n- scsi: qla2xxx: add more FW debug information (bsc#1157424).\n- scsi: qla2xxx: fix FW resource count values (bsc#1157424).\n- scsi: tcm_qla2xxx: Make qlt_alloc_qfull_cmd() set cmd-\u003ese_cmd.map_tag (bsc#1157424).\n- scsi: zfcp: trace channel log even for FCP command responses (git-fixes).\n- sctp: cache netns in sctp_ep_common (networking-stable-19_12_03).\n- sctp: free cmd-\u003eobj.chunk for the unprocessed SCTP_CMD_REPLY (networking-stable-20_01_11).\n- sctp: fully initialize v4 addr in some functions (networking-stable-19_12_28).\n- serial: 8250_bcm2835aux: Fix line mismatch on driver unbind (bsc#1051510).\n- serial: ifx6x60: add missed pm_runtime_disable (bsc#1051510).\n- serial: max310x: Fix tx_empty() callback (bsc#1051510).\n- serial: pl011: Fix DMA -\u003eflush_buffer() (bsc#1051510).\n- serial: serial_core: Perform NULL checks for break_ctl ops (bsc#1051510).\n- serial: stm32: fix transmit_chars when tx is stopped (bsc#1051510).\n- sfc: Only cancel the PPS workqueue if it exists (networking-stable-19_11_25).\n- sfc: Remove \u0027PCIE error reporting unavailable\u0027 (bsc#1161472).\n- sh_eth: TSU_QTAG0/1 registers the same as TSU_QTAGM0/1 (bsc#1051510).\n- sh_eth: check sh_eth_cpu_data::dual_port when dumping registers (bsc#1051510).\n- sh_eth: fix TSU init on SH7734/R8A7740 (bsc#1051510).\n- sh_eth: fix TXALCR1 offsets (bsc#1051510).\n- sh_eth: fix dumping ARSTR (bsc#1051510).\n- sh_eth: fix invalid context bug while calling auto-negotiation by ethtool (bsc#1051510).\n- sh_eth: fix invalid context bug while changing link options by ethtool (bsc#1051510).\n- smb3: Add defines for new information level, FileIdInformation (bsc#1144333).\n- smb3: Add missing reparse tags (bsc#1144333).\n- smb3: Fix regression in time handling (bsc#1144333).\n- smb3: add debug messages for closing unmatched open (bsc#1144333).\n- smb3: add dynamic tracepoints for flush and close (bsc#1144333).\n- smb3: add missing flag definitions (bsc#1144333).\n- smb3: add missing worker function for SMB3 change notify (bsc#1144333).\n- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1144333).\n- smb3: add mount option to allow forced caching of read only share (bsc#1144333).\n- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1144333).\n- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1144333).\n- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1144333).\n- smb3: allow disabling requesting leases (bsc#1144333).\n- smb3: allow parallelizing decryption of reads (bsc#1144333).\n- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1144333).\n- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1144333).\n- smb3: display max smb3 requests in flight at any one time (bsc#1144333).\n- smb3: dump in_send and num_waiters stats counters by default (bsc#1144333).\n- smb3: enable offload of decryption of large reads via mount option (bsc#1144333).\n- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1144333).\n- smb3: fix mode passed in on create for modetosid mount option (bsc#1144333).\n- smb3: fix performance regression with setting mtime (bsc#1144333).\n- smb3: fix potential null dereference in decrypt offload (bsc#1144333).\n- smb3: fix problem with null cifs super block with previous patch (bsc#1144333).\n- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1144333).\n- smb3: improve check for when we send the security descriptor context on create (bsc#1144333).\n- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1144333).\n- smb3: missing ACL related flags (bsc#1144333).\n- smb3: only offload decryption of read responses if multiple requests (bsc#1144333).\n- smb3: pass mode bits into create calls (bsc#1144333).\n- smb3: query attributes on file close (bsc#1144333).\n- smb3: remove confusing dmesg when mounting with encryption (\u0027seal\u0027) (bsc#1144333).\n- smb3: remove noisy debug message and minor cleanup (bsc#1144333).\n- smb3: remove unused flag passed into close functions (bsc#1144333).\n- soc/tegra: fuse: Correct straps\u0027 address for older Tegra124 device trees (bsc#1051510).\n- soc: renesas: rcar-sysc: Add goto to of_node_put() before return (bsc#1051510).\n- soc: ti: wkup_m3_ipc: Fix race condition with rproc_boot (bsc#1051510).\n- spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch (bsc#1051510).\n- spi: omap2-mcspi: Set FIFO DMA trigger level to word length (bsc#1051510).\n- spi: tegra114: clear packed bit for unpacked mode (bsc#1051510).\n- spi: tegra114: configure dma burst size to fifo trig level (bsc#1051510).\n- spi: tegra114: fix for unpacked mode transfers (bsc#1051510).\n- spi: tegra114: flush fifos (bsc#1051510).\n- spi: tegra114: terminate dma and reset on transfer timeout (bsc#1051510).\n- sr_vendor: support Beurer GL50 evo CD-on-a-chip devices (boo#1164632).\n- staging: comedi: adv_pci1710: fix AI channels 16-31 for PCI-1713 (bsc#1051510).\n- staging: rtl8188eu: fix interface sanity check (bsc#1051510).\n- staging: rtl8192e: fix potential use after free (bsc#1051510).\n- staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids (bsc#1051510).\n- staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).\n- staging: vt6656: Fix false Tx excessive retries reporting (bsc#1051510).\n- staging: vt6656: correct packet types for CTS protect, mode (bsc#1051510).\n- staging: vt6656: use NULLFUCTION stack on mac80211 (bsc#1051510).\n- staging: wlan-ng: ensure error return is actually returned (bsc#1051510).\n- stm class: Fix a double free of stm_source_device (bsc#1051510).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810, bsc#1161702).\n- stop_machine: Atomically queue and wake stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption after queueing stopper threads (bsc#1088810, bsc#1161702).\n- stop_machine: Disable preemption when waking two stopper threads (bsc#1088810, bsc#1161702).\n- tcp: clear tp-\u003edata_segs{in|out} in tcp_disconnect() (networking-stable-20_02_05).\n- tcp: clear tp-\u003edelivered in tcp_disconnect() (networking-stable-20_02_05).\n- tcp: clear tp-\u003epackets_out when purging write queue (bsc#1160560).\n- tcp: clear tp-\u003esegs_{in|out} in tcp_disconnect() (networking-stable-20_02_05).\n- tcp: clear tp-\u003etotal_retrans in tcp_disconnect() (networking-stable-20_02_05).\n- tcp: do not send empty skb from tcp_write_xmit() (networking-stable-20_01_01).\n- tcp: exit if nothing to retransmit on RTO timeout (bsc#1160560, stable 4.14.159).\n- tcp: fix \u0027old stuff\u0027 D-SACK causing SACK to be treated as D-SACK (networking-stable-20_01_11).\n- tcp: fix marked lost packets not being retransmitted (networking-stable-20_01_20).\n- tcp: md5: fix potential overestimation of TCP option space (networking-stable-19_12_16).\n- tcp_bbr: improve arithmetic division in bbr_update_bw() (networking-stable-20_01_27).\n- thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).\n- thunderbolt: Prevent crash if non-active NVMem file is read (git-fixes).\n- tipc: fix a missing check of genlmsg_put (bsc#1051510).\n- tipc: fix link name length check (bsc#1051510).\n- tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).\n- tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).\n- tools lib traceevent: Do not free tep-\u003ecmdlines in add_new_comm() on failure (git-fixes).\n- tracing: Annotate ftrace_graph_hash pointer with __rcu (git-fixes).\n- tracing: Annotate ftrace_graph_notrace_hash pointer with __rcu (git-fixes).\n- tracing: Fix tracing_stat return values in error handling paths (git-fixes).\n- tracing: Fix very unlikely race of registering two stat tracers (git-fixes).\n- tracing: Have the histogram compare functions convert to u64 first (bsc#1160210).\n- tracing: xen: Ordered comparison of function pointers (git-fixes).\n- tty/serial: atmel: Add is_half_duplex helper (bsc#1051510).\n- tty: n_hdlc: fix build on SPARC (bsc#1051510).\n- tty: serial: msm_serial: Fix lockup for sysrq and oops (bsc#1051510).\n- tty: vt: keyboard: reject invalid keycodes (bsc#1051510).\n- ttyprintk: fix a potential deadlock in interrupt context issue (git-fixes).\n- tun: add mutex_unlock() call and napi.skb clearing in tun_get_user() (bsc#1109837).\n- uaccess: Add non-pagefault user-space write function (bsc#1083647).\n- ubifs: Fix FS_IOC_SETFLAGS unexpectedly clearing encrypt flag (bsc#1163855).\n- ubifs: Fix deadlock in concurrent bulk-read and writepage (bsc#1163856).\n- ubifs: Reject unsupported ioctl flags explicitly (bsc#1163844).\n- ubifs: do not trigger assertion on invalid no-key filename (bsc#1163850).\n- udp: fix integer overflow while computing available space in sk_rcvbuf (networking-stable-20_01_01).\n- usb-storage: Disable UAS on JMicron SATA enclosure (bsc#1051510).\n- usb: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- usb: chipidea: host: Disable port power only if previously enabled (bsc#1051510).\n- usb: core: hub: Improved device recognition on remote wakeup (bsc#1051510).\n- usb: core: urb: fix URB structure initialization function (bsc#1051510).\n- usb: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- usb: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- usb: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- usb: dwc3: turn off VBUS when leaving host mode (bsc#1051510).\n- usb: gadget: Zero ffs_io_data (bsc#1051510).\n- usb: gadget: f_ecm: Use atomic_t to track in-flight request (bsc#1051510).\n- usb: gadget: f_ncm: Use atomic_t to track in-flight request (bsc#1051510).\n- usb: gadget: legacy: set max_speed to super-speed (bsc#1051510).\n- usb: gadget: pch_udc: fix use after free (bsc#1051510).\n- usb: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- usb: host: xhci-hub: fix extra endianness conversion (bsc#1051510).\n- usb: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n- usb: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- usb: musb: dma: Correct parameter passed to IRQ handler (bsc#1051510).\n- usb: musb: fix idling for suspend after disconnect interrupt (bsc#1051510).\n- usb: roles: fix a potential use after free (git-fixes).\n- usb: typec: tcpci: mask event interrupts when remove driver (bsc#1051510).\n- usb: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- usb: xhci: only set D3hot for pci device (bsc#1051510).\n- usbip: Fix error path of vhci_recv_ret_submit() (git-fixes).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- usbip: Fix uninitialized symbol \u0027nents\u0027 in stub_recv_cmd_submit() (git-fixes).\n- vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1 (bsc#1051510).\n- vhost/vsock: accept only packets with the right dst_cid (networking-stable-20_01_01).\n- video: backlight: Add devres versions of of_find_backlight (bsc#1090888) Taken for 6010831dde5.\n- video: backlight: Add of_find_backlight helper in backlight.c (bsc#1090888) Taken for 6010831dde5.\n- vlan: fix memory leak in vlan_dev_set_egress_priority (networking-stable-20_01_11).\n- vlan: vlan_changelink() should propagate errors (networking-stable-20_01_11).\n- vxlan: fix tos value before xmit (networking-stable-20_01_11).\n- watchdog: max77620_wdt: fix potential build errors (bsc#1051510).\n- watchdog: rn5t618_wdt: fix module aliases (bsc#1051510).\n- watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).\n- watchdog: wdat_wdt: fix get_timeleft call for wdat_wdt (bsc#1162557).\n- wireless: fix enabling channel 12 for custom regulatory domain (bsc#1051510).\n- wireless: wext: avoid gcc -O3 warning (bsc#1051510).\n- workqueue: Fix pwq ref leak in rescuer_thread() (bsc#1160211).\n- x86/MCE/AMD: Allow Reserved types to be overwritten in smca_banks (bsc#1114279).\n- x86/MCE/AMD: Do not use rdmsr_safe_on_cpu() in smca_configure() (bsc#1114279).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 70h (bsc#1163206).\n- x86/cpu: Update cached HLE state on write to TSX_CTRL_CPUID_CLEAR (bsc#1162619).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/intel_rdt: Split resource group removal in two (bsc#1112178).\n- x86/kgbd: Use NMI_VECTOR not APIC_DM_NMI (bsc#1114279).\n- x86/mce/AMD: Allow any CPU to initialize the smca_banks array (bsc#1114279).\n- x86/mce: Fix possibly incorrect severity calculation on AMD (bsc#1114279).\n- x86/resctrl: Check monitoring static key in the MBM overflow handler (bsc#1114279).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix a deadlock due to inaccurate reference (bsc#1112178).\n- x86/resctrl: Fix an imbalance in domain_remove_cpu() (bsc#1114279).\n- x86/resctrl: Fix potential memory leak (bsc#1114279).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free due to inaccurate refcount of rdtgroup (bsc#1112178).\n- x86/resctrl: Fix use-after-free when deleting resource groups (bsc#1114279).\n- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).\n- xen-blkfront: switch kcalloc to kvcalloc for large array allocation (bsc#1160917).\n- xen/balloon: Support xend-based toolstack take two (bsc#1065600).\n- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n- xen/blkfront: Adjust indentation in xlvbd_alloc_gendisk (bsc#1065600).\n- xen: Enable interrupts when calling _cond_resched() (bsc#1065600).\n- xfrm: Fix transport mode skb control buffer usage (bsc#1161552).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1161087, bsc#1153917).\n- xhci: Fix memory leak in xhci_add_in_port() (bsc#1051510).\n- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n- xhci: fix USB3 device initiated resume race with roothub autosuspend (bsc#1051510).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xhci: make sure interrupts are restored to correct state (bsc#1051510).\n- zd1211rw: fix storage endpoint lookup (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2020-336",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0336-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2020:0336-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2020:0336-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1046303",
        "url": "https://bugzilla.suse.com/1046303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050244",
        "url": "https://bugzilla.suse.com/1050244"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1050549",
        "url": "https://bugzilla.suse.com/1050549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051858",
        "url": "https://bugzilla.suse.com/1051858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1060463",
        "url": "https://bugzilla.suse.com/1060463"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1061840",
        "url": "https://bugzilla.suse.com/1061840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1071995",
        "url": "https://bugzilla.suse.com/1071995"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1083647",
        "url": "https://bugzilla.suse.com/1083647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1085030",
        "url": "https://bugzilla.suse.com/1085030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086301",
        "url": "https://bugzilla.suse.com/1086301"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086313",
        "url": "https://bugzilla.suse.com/1086313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1086314",
        "url": "https://bugzilla.suse.com/1086314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1088810",
        "url": "https://bugzilla.suse.com/1088810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1090888",
        "url": "https://bugzilla.suse.com/1090888"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103989",
        "url": "https://bugzilla.suse.com/1103989"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103990",
        "url": "https://bugzilla.suse.com/1103990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103991",
        "url": "https://bugzilla.suse.com/1103991"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103992",
        "url": "https://bugzilla.suse.com/1103992"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104353",
        "url": "https://bugzilla.suse.com/1104353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104427",
        "url": "https://bugzilla.suse.com/1104427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104745",
        "url": "https://bugzilla.suse.com/1104745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1105392",
        "url": "https://bugzilla.suse.com/1105392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1109837",
        "url": "https://bugzilla.suse.com/1109837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111666",
        "url": "https://bugzilla.suse.com/1111666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112374",
        "url": "https://bugzilla.suse.com/1112374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112504",
        "url": "https://bugzilla.suse.com/1112504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113956",
        "url": "https://bugzilla.suse.com/1113956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114685",
        "url": "https://bugzilla.suse.com/1114685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1115026",
        "url": "https://bugzilla.suse.com/1115026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118338",
        "url": "https://bugzilla.suse.com/1118338"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1118661",
        "url": "https://bugzilla.suse.com/1118661"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1123328",
        "url": "https://bugzilla.suse.com/1123328"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126206",
        "url": "https://bugzilla.suse.com/1126206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127371",
        "url": "https://bugzilla.suse.com/1127371"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127611",
        "url": "https://bugzilla.suse.com/1127611"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127682",
        "url": "https://bugzilla.suse.com/1127682"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129551",
        "url": "https://bugzilla.suse.com/1129551"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129770",
        "url": "https://bugzilla.suse.com/1129770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133147",
        "url": "https://bugzilla.suse.com/1133147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1134090",
        "url": "https://bugzilla.suse.com/1134090"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1134973",
        "url": "https://bugzilla.suse.com/1134973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1136157",
        "url": "https://bugzilla.suse.com/1136157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1136333",
        "url": "https://bugzilla.suse.com/1136333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1140025",
        "url": "https://bugzilla.suse.com/1140025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1142685",
        "url": "https://bugzilla.suse.com/1142685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1143959",
        "url": "https://bugzilla.suse.com/1143959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144162",
        "url": "https://bugzilla.suse.com/1144162"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144333",
        "url": "https://bugzilla.suse.com/1144333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146539",
        "url": "https://bugzilla.suse.com/1146539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151548",
        "url": "https://bugzilla.suse.com/1151548"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151910",
        "url": "https://bugzilla.suse.com/1151910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151927",
        "url": "https://bugzilla.suse.com/1151927"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152107",
        "url": "https://bugzilla.suse.com/1152107"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152631",
        "url": "https://bugzilla.suse.com/1152631"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153535",
        "url": "https://bugzilla.suse.com/1153535"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1153917",
        "url": "https://bugzilla.suse.com/1153917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154243",
        "url": "https://bugzilla.suse.com/1154243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154601",
        "url": "https://bugzilla.suse.com/1154601"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154768",
        "url": "https://bugzilla.suse.com/1154768"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154916",
        "url": "https://bugzilla.suse.com/1154916"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155331",
        "url": "https://bugzilla.suse.com/1155331"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155334",
        "url": "https://bugzilla.suse.com/1155334"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155689",
        "url": "https://bugzilla.suse.com/1155689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156259",
        "url": "https://bugzilla.suse.com/1156259"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156286",
        "url": "https://bugzilla.suse.com/1156286"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156462",
        "url": "https://bugzilla.suse.com/1156462"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157155",
        "url": "https://bugzilla.suse.com/1157155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157157",
        "url": "https://bugzilla.suse.com/1157157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157169",
        "url": "https://bugzilla.suse.com/1157169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157303",
        "url": "https://bugzilla.suse.com/1157303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157424",
        "url": "https://bugzilla.suse.com/1157424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157480",
        "url": "https://bugzilla.suse.com/1157480"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157692",
        "url": "https://bugzilla.suse.com/1157692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157853",
        "url": "https://bugzilla.suse.com/1157853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157895",
        "url": "https://bugzilla.suse.com/1157895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157908",
        "url": "https://bugzilla.suse.com/1157908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157966",
        "url": "https://bugzilla.suse.com/1157966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158013",
        "url": "https://bugzilla.suse.com/1158013"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158021",
        "url": "https://bugzilla.suse.com/1158021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158026",
        "url": "https://bugzilla.suse.com/1158026"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158071",
        "url": "https://bugzilla.suse.com/1158071"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158094",
        "url": "https://bugzilla.suse.com/1158094"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158132",
        "url": "https://bugzilla.suse.com/1158132"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158533",
        "url": "https://bugzilla.suse.com/1158533"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158819",
        "url": "https://bugzilla.suse.com/1158819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158823",
        "url": "https://bugzilla.suse.com/1158823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158824",
        "url": "https://bugzilla.suse.com/1158824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158827",
        "url": "https://bugzilla.suse.com/1158827"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158834",
        "url": "https://bugzilla.suse.com/1158834"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158893",
        "url": "https://bugzilla.suse.com/1158893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158900",
        "url": "https://bugzilla.suse.com/1158900"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158903",
        "url": "https://bugzilla.suse.com/1158903"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158904",
        "url": "https://bugzilla.suse.com/1158904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158954",
        "url": "https://bugzilla.suse.com/1158954"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159024",
        "url": "https://bugzilla.suse.com/1159024"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159028",
        "url": "https://bugzilla.suse.com/1159028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159271",
        "url": "https://bugzilla.suse.com/1159271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159297",
        "url": "https://bugzilla.suse.com/1159297"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159377",
        "url": "https://bugzilla.suse.com/1159377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159394",
        "url": "https://bugzilla.suse.com/1159394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159483",
        "url": "https://bugzilla.suse.com/1159483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159484",
        "url": "https://bugzilla.suse.com/1159484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159500",
        "url": "https://bugzilla.suse.com/1159500"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159569",
        "url": "https://bugzilla.suse.com/1159569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159588",
        "url": "https://bugzilla.suse.com/1159588"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159841",
        "url": "https://bugzilla.suse.com/1159841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159908",
        "url": "https://bugzilla.suse.com/1159908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159909",
        "url": "https://bugzilla.suse.com/1159909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159910",
        "url": "https://bugzilla.suse.com/1159910"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159911",
        "url": "https://bugzilla.suse.com/1159911"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159955",
        "url": "https://bugzilla.suse.com/1159955"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160147",
        "url": "https://bugzilla.suse.com/1160147"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160195",
        "url": "https://bugzilla.suse.com/1160195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160210",
        "url": "https://bugzilla.suse.com/1160210"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160211",
        "url": "https://bugzilla.suse.com/1160211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160218",
        "url": "https://bugzilla.suse.com/1160218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160433",
        "url": "https://bugzilla.suse.com/1160433"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160442",
        "url": "https://bugzilla.suse.com/1160442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160469",
        "url": "https://bugzilla.suse.com/1160469"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160470",
        "url": "https://bugzilla.suse.com/1160470"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160476",
        "url": "https://bugzilla.suse.com/1160476"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160560",
        "url": "https://bugzilla.suse.com/1160560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160618",
        "url": "https://bugzilla.suse.com/1160618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160659",
        "url": "https://bugzilla.suse.com/1160659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160678",
        "url": "https://bugzilla.suse.com/1160678"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160755",
        "url": "https://bugzilla.suse.com/1160755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160756",
        "url": "https://bugzilla.suse.com/1160756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160784",
        "url": "https://bugzilla.suse.com/1160784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160787",
        "url": "https://bugzilla.suse.com/1160787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160802",
        "url": "https://bugzilla.suse.com/1160802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160803",
        "url": "https://bugzilla.suse.com/1160803"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160804",
        "url": "https://bugzilla.suse.com/1160804"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160917",
        "url": "https://bugzilla.suse.com/1160917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160966",
        "url": "https://bugzilla.suse.com/1160966"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160979",
        "url": "https://bugzilla.suse.com/1160979"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161087",
        "url": "https://bugzilla.suse.com/1161087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161243",
        "url": "https://bugzilla.suse.com/1161243"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161360",
        "url": "https://bugzilla.suse.com/1161360"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161472",
        "url": "https://bugzilla.suse.com/1161472"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161514",
        "url": "https://bugzilla.suse.com/1161514"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161518",
        "url": "https://bugzilla.suse.com/1161518"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161522",
        "url": "https://bugzilla.suse.com/1161522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161523",
        "url": "https://bugzilla.suse.com/1161523"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161549",
        "url": "https://bugzilla.suse.com/1161549"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161552",
        "url": "https://bugzilla.suse.com/1161552"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161674",
        "url": "https://bugzilla.suse.com/1161674"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161702",
        "url": "https://bugzilla.suse.com/1161702"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161907",
        "url": "https://bugzilla.suse.com/1161907"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161931",
        "url": "https://bugzilla.suse.com/1161931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161933",
        "url": "https://bugzilla.suse.com/1161933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161934",
        "url": "https://bugzilla.suse.com/1161934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161935",
        "url": "https://bugzilla.suse.com/1161935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161936",
        "url": "https://bugzilla.suse.com/1161936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161937",
        "url": "https://bugzilla.suse.com/1161937"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161951",
        "url": "https://bugzilla.suse.com/1161951"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162028",
        "url": "https://bugzilla.suse.com/1162028"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162067",
        "url": "https://bugzilla.suse.com/1162067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162109",
        "url": "https://bugzilla.suse.com/1162109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162139",
        "url": "https://bugzilla.suse.com/1162139"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162557",
        "url": "https://bugzilla.suse.com/1162557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162617",
        "url": "https://bugzilla.suse.com/1162617"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162618",
        "url": "https://bugzilla.suse.com/1162618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162619",
        "url": "https://bugzilla.suse.com/1162619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162623",
        "url": "https://bugzilla.suse.com/1162623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162943",
        "url": "https://bugzilla.suse.com/1162943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163206",
        "url": "https://bugzilla.suse.com/1163206"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163383",
        "url": "https://bugzilla.suse.com/1163383"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163384",
        "url": "https://bugzilla.suse.com/1163384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163762",
        "url": "https://bugzilla.suse.com/1163762"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163774",
        "url": "https://bugzilla.suse.com/1163774"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163836",
        "url": "https://bugzilla.suse.com/1163836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163840",
        "url": "https://bugzilla.suse.com/1163840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163841",
        "url": "https://bugzilla.suse.com/1163841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163842",
        "url": "https://bugzilla.suse.com/1163842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163843",
        "url": "https://bugzilla.suse.com/1163843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163844",
        "url": "https://bugzilla.suse.com/1163844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163845",
        "url": "https://bugzilla.suse.com/1163845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163846",
        "url": "https://bugzilla.suse.com/1163846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163849",
        "url": "https://bugzilla.suse.com/1163849"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163850",
        "url": "https://bugzilla.suse.com/1163850"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163851",
        "url": "https://bugzilla.suse.com/1163851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163852",
        "url": "https://bugzilla.suse.com/1163852"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163853",
        "url": "https://bugzilla.suse.com/1163853"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163855",
        "url": "https://bugzilla.suse.com/1163855"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163856",
        "url": "https://bugzilla.suse.com/1163856"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163857",
        "url": "https://bugzilla.suse.com/1163857"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163858",
        "url": "https://bugzilla.suse.com/1163858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163859",
        "url": "https://bugzilla.suse.com/1163859"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163860",
        "url": "https://bugzilla.suse.com/1163860"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163861",
        "url": "https://bugzilla.suse.com/1163861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163862",
        "url": "https://bugzilla.suse.com/1163862"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163863",
        "url": "https://bugzilla.suse.com/1163863"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163867",
        "url": "https://bugzilla.suse.com/1163867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163869",
        "url": "https://bugzilla.suse.com/1163869"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163880",
        "url": "https://bugzilla.suse.com/1163880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163971",
        "url": "https://bugzilla.suse.com/1163971"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164051",
        "url": "https://bugzilla.suse.com/1164051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164069",
        "url": "https://bugzilla.suse.com/1164069"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164098",
        "url": "https://bugzilla.suse.com/1164098"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164115",
        "url": "https://bugzilla.suse.com/1164115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164314",
        "url": "https://bugzilla.suse.com/1164314"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164315",
        "url": "https://bugzilla.suse.com/1164315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164388",
        "url": "https://bugzilla.suse.com/1164388"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164471",
        "url": "https://bugzilla.suse.com/1164471"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164598",
        "url": "https://bugzilla.suse.com/1164598"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164632",
        "url": "https://bugzilla.suse.com/1164632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164705",
        "url": "https://bugzilla.suse.com/1164705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164712",
        "url": "https://bugzilla.suse.com/1164712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164727",
        "url": "https://bugzilla.suse.com/1164727"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164728",
        "url": "https://bugzilla.suse.com/1164728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164729",
        "url": "https://bugzilla.suse.com/1164729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164730",
        "url": "https://bugzilla.suse.com/1164730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164731",
        "url": "https://bugzilla.suse.com/1164731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164732",
        "url": "https://bugzilla.suse.com/1164732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164733",
        "url": "https://bugzilla.suse.com/1164733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164734",
        "url": "https://bugzilla.suse.com/1164734"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164735",
        "url": "https://bugzilla.suse.com/1164735"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165404",
        "url": "https://bugzilla.suse.com/1165404"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165488",
        "url": "https://bugzilla.suse.com/1165488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165527",
        "url": "https://bugzilla.suse.com/1165527"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165813",
        "url": "https://bugzilla.suse.com/1165813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165881",
        "url": "https://bugzilla.suse.com/1165881"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14615 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14897 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14897/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16746 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16746/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16994 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16994/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18808 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19036 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19036/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19045 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19051 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19066 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19318 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19318/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19319 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19319/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19332 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19332/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19338 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19338/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19447 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19447/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19523 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19523/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19526 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19526/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19527 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19527/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19532 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19532/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19533 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19533/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19535 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19535/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19537 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19537/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19767 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19927 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19927/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19965 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19965/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19966 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20054 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20054/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20095 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-20096 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-20096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-7053 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-7053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8428 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8428/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8992 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8992/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-03-13T05:15:16Z",
      "generator": {
        "date": "2020-03-13T05:15:16Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2020:0336-1",
      "initial_release_date": "2020-03-13T05:15:16Z",
      "revision_history": [
        {
          "date": "2020-03-13T05:15:16Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-lp151.28.40.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-lp151.28.40.1.noarch",
                  "product_id": "kernel-devel-4.12.14-lp151.28.40.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-lp151.28.40.1.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-lp151.28.40.1.noarch",
                  "product_id": "kernel-docs-4.12.14-lp151.28.40.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
                  "product_id": "kernel-docs-html-4.12.14-lp151.28.40.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-lp151.28.40.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-lp151.28.40.1.noarch",
                  "product_id": "kernel-macros-4.12.14-lp151.28.40.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-lp151.28.40.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-lp151.28.40.1.noarch",
                  "product_id": "kernel-source-4.12.14-lp151.28.40.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-debug-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-default-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.1",
                "product": {
                  "name": "openSUSE Leap 15.1",
                  "product_id": "openSUSE Leap 15.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-debug-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-base-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-lp151.28.40.1.noarch as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-lp151.28.40.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-lp151.28.40.1.noarch as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-lp151.28.40.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-html-4.12.14-lp151.28.40.1.noarch as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch"
        },
        "product_reference": "kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-lp151.28.40.1.noarch as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-lp151.28.40.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-lp151.28.40.1.noarch as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-lp151.28.40.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch"
        },
        "product_reference": "kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64 as component of openSUSE Leap 15.1",
          "product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        },
        "product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-14615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14615",
          "url": "https://www.suse.com/security/cve/CVE-2019-14615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160195 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1160195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165881 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1165881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14615"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-14897",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14897"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14897",
          "url": "https://www.suse.com/security/cve/CVE-2019-14897"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157155 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1157155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160467 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14897",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14897"
    },
    {
      "cve": "CVE-2019-16746",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16746"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16746",
          "url": "https://www.suse.com/security/cve/CVE-2019-16746"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1152107 for CVE-2019-16746",
          "url": "https://bugzilla.suse.com/1152107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173659 for CVE-2019-16746",
          "url": "https://bugzilla.suse.com/1173659"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16746"
    },
    {
      "cve": "CVE-2019-16994",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16994"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-\u003efb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16994",
          "url": "https://www.suse.com/security/cve/CVE-2019-16994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161523 for CVE-2019-16994",
          "url": "https://bugzilla.suse.com/1161523"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16994"
    },
    {
      "cve": "CVE-2019-18808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18808",
          "url": "https://www.suse.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156259 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1156259"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18808"
    },
    {
      "cve": "CVE-2019-19036",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19036"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root-\u003enode) can be zero.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19036",
          "url": "https://www.suse.com/security/cve/CVE-2019-19036"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157692 for CVE-2019-19036",
          "url": "https://bugzilla.suse.com/1157692"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19036"
    },
    {
      "cve": "CVE-2019-19045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19045",
          "url": "https://www.suse.com/security/cve/CVE-2019-19045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161522 for CVE-2019-19045",
          "url": "https://bugzilla.suse.com/1161522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19045"
    },
    {
      "cve": "CVE-2019-19051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19051",
          "url": "https://www.suse.com/security/cve/CVE-2019-19051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159024 for CVE-2019-19051",
          "url": "https://bugzilla.suse.com/1159024"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19051"
    },
    {
      "cve": "CVE-2019-19054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19054",
          "url": "https://www.suse.com/security/cve/CVE-2019-19054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161518 for CVE-2019-19054",
          "url": "https://bugzilla.suse.com/1161518"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19054"
    },
    {
      "cve": "CVE-2019-19066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19066",
          "url": "https://www.suse.com/security/cve/CVE-2019-19066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157303 for CVE-2019-19066",
          "url": "https://bugzilla.suse.com/1157303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19066"
    },
    {
      "cve": "CVE-2019-19318",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19318"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19318",
          "url": "https://www.suse.com/security/cve/CVE-2019-19318"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158026 for CVE-2019-19318",
          "url": "https://bugzilla.suse.com/1158026"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19318"
    },
    {
      "cve": "CVE-2019-19319",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19319"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19319",
          "url": "https://www.suse.com/security/cve/CVE-2019-19319"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158021 for CVE-2019-19319",
          "url": "https://bugzilla.suse.com/1158021"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19319"
    },
    {
      "cve": "CVE-2019-19332",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19332"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19332",
          "url": "https://www.suse.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158827 for CVE-2019-19332",
          "url": "https://bugzilla.suse.com/1158827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19332"
    },
    {
      "cve": "CVE-2019-19338",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19338"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19338",
          "url": "https://www.suse.com/security/cve/CVE-2019-19338"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158954 for CVE-2019-19338",
          "url": "https://bugzilla.suse.com/1158954"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19338"
    },
    {
      "cve": "CVE-2019-19447",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19447"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19447",
          "url": "https://www.suse.com/security/cve/CVE-2019-19447"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158819 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1158819"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173869 for CVE-2019-19447",
          "url": "https://bugzilla.suse.com/1173869"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-19447"
    },
    {
      "cve": "CVE-2019-19523",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19523"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19523",
          "url": "https://www.suse.com/security/cve/CVE-2019-19523"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158823 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19523",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19523"
    },
    {
      "cve": "CVE-2019-19526",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19526"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19526",
          "url": "https://www.suse.com/security/cve/CVE-2019-19526"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19526",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19526",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158893 for CVE-2019-19526",
          "url": "https://bugzilla.suse.com/1158893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19526"
    },
    {
      "cve": "CVE-2019-19527",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19527"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19527",
          "url": "https://www.suse.com/security/cve/CVE-2019-19527"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158900 for CVE-2019-19527",
          "url": "https://bugzilla.suse.com/1158900"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19527"
    },
    {
      "cve": "CVE-2019-19532",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19532"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19532",
          "url": "https://www.suse.com/security/cve/CVE-2019-19532"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158823 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158824 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19532",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19532"
    },
    {
      "cve": "CVE-2019-19533",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19533"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19533",
          "url": "https://www.suse.com/security/cve/CVE-2019-19533"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19533",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19533",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19533"
    },
    {
      "cve": "CVE-2019-19535",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19535"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19535",
          "url": "https://www.suse.com/security/cve/CVE-2019-19535"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158903 for CVE-2019-19535",
          "url": "https://bugzilla.suse.com/1158903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19535"
    },
    {
      "cve": "CVE-2019-19537",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19537"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19537",
          "url": "https://www.suse.com/security/cve/CVE-2019-19537"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158834"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158904 for CVE-2019-19537",
          "url": "https://bugzilla.suse.com/1158904"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19537"
    },
    {
      "cve": "CVE-2019-19767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19767",
          "url": "https://www.suse.com/security/cve/CVE-2019-19767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159297 for CVE-2019-19767",
          "url": "https://bugzilla.suse.com/1159297"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19767"
    },
    {
      "cve": "CVE-2019-19927",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19927"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19927",
          "url": "https://www.suse.com/security/cve/CVE-2019-19927"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160147 for CVE-2019-19927",
          "url": "https://bugzilla.suse.com/1160147"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19927"
    },
    {
      "cve": "CVE-2019-19965",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19965"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19965",
          "url": "https://www.suse.com/security/cve/CVE-2019-19965"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159911 for CVE-2019-19965",
          "url": "https://bugzilla.suse.com/1159911"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19965"
    },
    {
      "cve": "CVE-2019-19966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19966",
          "url": "https://www.suse.com/security/cve/CVE-2019-19966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159841 for CVE-2019-19966",
          "url": "https://bugzilla.suse.com/1159841"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-19966"
    },
    {
      "cve": "CVE-2019-20054",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20054"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20054",
          "url": "https://www.suse.com/security/cve/CVE-2019-20054"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159910 for CVE-2019-20054",
          "url": "https://bugzilla.suse.com/1159910"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20054"
    },
    {
      "cve": "CVE-2019-20095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20095",
          "url": "https://www.suse.com/security/cve/CVE-2019-20095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159909 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159914 for CVE-2019-20095",
          "url": "https://bugzilla.suse.com/1159914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-20095"
    },
    {
      "cve": "CVE-2019-20096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-20096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-20096",
          "url": "https://www.suse.com/security/cve/CVE-2019-20096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159908 for CVE-2019-20096",
          "url": "https://bugzilla.suse.com/1159908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-20096"
    },
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-7053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-7053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-7053",
          "url": "https://www.suse.com/security/cve/CVE-2020-7053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160966 for CVE-2020-7053",
          "url": "https://bugzilla.suse.com/1160966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-7053"
    },
    {
      "cve": "CVE-2020-8428",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8428"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8428",
          "url": "https://www.suse.com/security/cve/CVE-2020-8428"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162109 for CVE-2020-8428",
          "url": "https://bugzilla.suse.com/1162109"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8428"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8992",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8992"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
          "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
          "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8992",
          "url": "https://www.suse.com/security/cve/CVE-2020-8992"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164069 for CVE-2020-8992",
          "url": "https://bugzilla.suse.com/1164069"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.40.1.noarch",
            "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.40.1.x86_64",
            "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.40.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-13T05:15:16Z",
          "details": "low"
        }
      ],
      "title": "CVE-2020-8992"
    }
  ]
}
  opensuse-su-2024:10728-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "kernel-devel-5.14.6-1.4 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-10728",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10728-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-1000251 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-1000251/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-12153 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-12153/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-13080 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-13080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-14051 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-14051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-15129 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-15129/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-15265 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-15265/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16536 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16536/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16537 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16537/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16645 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16645/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16646 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16646/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16647 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16648 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16995 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16995/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16996 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16996/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17448 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17448/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17449 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17449/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17450 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17450/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17852 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17852/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17853 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17853/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17854 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17854/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17855 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17855/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17856 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17856/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17857 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17857/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17862 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17862/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5123 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5123/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5715 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5715/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5753 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5754 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5754/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7541 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7541/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7542 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7542/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-8824 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-8824/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-8831 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-8831/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-1000004 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-10322 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-10322/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-10323 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-10323/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-1068 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-1068/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-1118 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-1118/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12232 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12232/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12714 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12714/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-13053 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-13053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-18710 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-18710/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-19824 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-19824/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-5332 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-5332/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-5333 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-5333/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-8043 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-8043/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-8087 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-8087/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-8822 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-8822/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-10207 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-10207/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-11477 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-11477/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-11478 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-11478/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-11479 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-11479/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14615 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14814 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14814/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15030 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15030/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15031 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15031/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15098 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15098/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15099 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15290 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15290/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15504 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15504/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15902 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15902/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16231 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16231/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16232 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16232/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16234 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16234/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17133 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17133/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17666 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17666/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18808 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18812 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18812/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18813 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18813/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19252 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19252/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19332 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19332/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19338 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19338/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3016 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3016/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3846 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3846/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3882 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3882/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3887 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3887/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-6974 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-6974/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-7221 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-7221/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-7222 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-7222/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-8564 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-8564/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-8912 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-8912/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-9500 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-9500/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10135 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10135/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10766 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10766/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10767 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10768 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12351 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12351/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12352 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12352/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14331 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14331/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14386 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14386/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-24586 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-24586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-24587 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-24587/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-24588 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-24588/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25639 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25656 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25668 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25668/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-26141 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-26141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29660 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29660/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29661 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29661/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8694 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8694/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-23133 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-23133/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-26708 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-26708/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-28971 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-28971/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-32606 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-32606/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33909 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33909/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3483 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3483/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3489 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3489/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3490 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3490/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3491 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3491/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3640 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3653 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3656 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3744 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3744/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3753 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3759 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38166 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38166/"
      }
    ],
    "title": "kernel-devel-5.14.6-1.4 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:10728-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.14.6-1.4.aarch64",
                "product": {
                  "name": "kernel-devel-5.14.6-1.4.aarch64",
                  "product_id": "kernel-devel-5.14.6-1.4.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.14.6-1.4.aarch64",
                "product": {
                  "name": "kernel-macros-5.14.6-1.4.aarch64",
                  "product_id": "kernel-macros-5.14.6-1.4.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.14.6-1.4.aarch64",
                "product": {
                  "name": "kernel-source-5.14.6-1.4.aarch64",
                  "product_id": "kernel-source-5.14.6-1.4.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.14.6-1.4.aarch64",
                "product": {
                  "name": "kernel-source-vanilla-5.14.6-1.4.aarch64",
                  "product_id": "kernel-source-vanilla-5.14.6-1.4.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.14.6-1.4.ppc64le",
                "product": {
                  "name": "kernel-devel-5.14.6-1.4.ppc64le",
                  "product_id": "kernel-devel-5.14.6-1.4.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.14.6-1.4.ppc64le",
                "product": {
                  "name": "kernel-macros-5.14.6-1.4.ppc64le",
                  "product_id": "kernel-macros-5.14.6-1.4.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.14.6-1.4.ppc64le",
                "product": {
                  "name": "kernel-source-5.14.6-1.4.ppc64le",
                  "product_id": "kernel-source-5.14.6-1.4.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le",
                "product": {
                  "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le",
                  "product_id": "kernel-source-vanilla-5.14.6-1.4.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.14.6-1.4.s390x",
                "product": {
                  "name": "kernel-devel-5.14.6-1.4.s390x",
                  "product_id": "kernel-devel-5.14.6-1.4.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.14.6-1.4.s390x",
                "product": {
                  "name": "kernel-macros-5.14.6-1.4.s390x",
                  "product_id": "kernel-macros-5.14.6-1.4.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.14.6-1.4.s390x",
                "product": {
                  "name": "kernel-source-5.14.6-1.4.s390x",
                  "product_id": "kernel-source-5.14.6-1.4.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.14.6-1.4.s390x",
                "product": {
                  "name": "kernel-source-vanilla-5.14.6-1.4.s390x",
                  "product_id": "kernel-source-vanilla-5.14.6-1.4.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-5.14.6-1.4.x86_64",
                "product": {
                  "name": "kernel-devel-5.14.6-1.4.x86_64",
                  "product_id": "kernel-devel-5.14.6-1.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-5.14.6-1.4.x86_64",
                "product": {
                  "name": "kernel-macros-5.14.6-1.4.x86_64",
                  "product_id": "kernel-macros-5.14.6-1.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-5.14.6-1.4.x86_64",
                "product": {
                  "name": "kernel-source-5.14.6-1.4.x86_64",
                  "product_id": "kernel-source-5.14.6-1.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-5.14.6-1.4.x86_64",
                "product": {
                  "name": "kernel-source-vanilla-5.14.6-1.4.x86_64",
                  "product_id": "kernel-source-vanilla-5.14.6-1.4.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64"
        },
        "product_reference": "kernel-devel-5.14.6-1.4.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le"
        },
        "product_reference": "kernel-devel-5.14.6-1.4.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x"
        },
        "product_reference": "kernel-devel-5.14.6-1.4.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64"
        },
        "product_reference": "kernel-devel-5.14.6-1.4.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64"
        },
        "product_reference": "kernel-macros-5.14.6-1.4.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le"
        },
        "product_reference": "kernel-macros-5.14.6-1.4.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x"
        },
        "product_reference": "kernel-macros-5.14.6-1.4.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64"
        },
        "product_reference": "kernel-macros-5.14.6-1.4.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64"
        },
        "product_reference": "kernel-source-5.14.6-1.4.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le"
        },
        "product_reference": "kernel-source-5.14.6-1.4.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x"
        },
        "product_reference": "kernel-source-5.14.6-1.4.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64"
        },
        "product_reference": "kernel-source-5.14.6-1.4.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64"
        },
        "product_reference": "kernel-source-vanilla-5.14.6-1.4.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le"
        },
        "product_reference": "kernel-source-vanilla-5.14.6-1.4.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x"
        },
        "product_reference": "kernel-source-vanilla-5.14.6-1.4.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        },
        "product_reference": "kernel-source-vanilla-5.14.6-1.4.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-1000251",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-1000251"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-1000251",
          "url": "https://www.suse.com/security/cve/CVE-2017-1000251"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1057389 for CVE-2017-1000251",
          "url": "https://bugzilla.suse.com/1057389"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1057950 for CVE-2017-1000251",
          "url": "https://bugzilla.suse.com/1057950"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1070535 for CVE-2017-1000251",
          "url": "https://bugzilla.suse.com/1070535"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1072117 for CVE-2017-1000251",
          "url": "https://bugzilla.suse.com/1072117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1072162 for CVE-2017-1000251",
          "url": "https://bugzilla.suse.com/1072162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1120758 for CVE-2017-1000251",
          "url": "https://bugzilla.suse.com/1120758"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-1000251"
    },
    {
      "cve": "CVE-2017-12153",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-12153"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-12153",
          "url": "https://www.suse.com/security/cve/CVE-2017-12153"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1058410 for CVE-2017-12153",
          "url": "https://bugzilla.suse.com/1058410"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1058624 for CVE-2017-12153",
          "url": "https://bugzilla.suse.com/1058624"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-12153"
    },
    {
      "cve": "CVE-2017-13080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-13080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-13080",
          "url": "https://www.suse.com/security/cve/CVE-2017-13080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1056061 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1056061"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1063479 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1063479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1063667 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1063667"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1063671 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1063671"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1066295 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1066295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1105108 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1105108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178872 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1178872"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179588 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1179588"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-13080"
    },
    {
      "cve": "CVE-2017-14051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-14051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-14051",
          "url": "https://www.suse.com/security/cve/CVE-2017-14051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1056588 for CVE-2017-14051",
          "url": "https://bugzilla.suse.com/1056588"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-14051"
    },
    {
      "cve": "CVE-2017-15129",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-15129"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-15129",
          "url": "https://www.suse.com/security/cve/CVE-2017-15129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074839 for CVE-2017-15129",
          "url": "https://bugzilla.suse.com/1074839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-15129"
    },
    {
      "cve": "CVE-2017-15265",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-15265"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-15265",
          "url": "https://www.suse.com/security/cve/CVE-2017-15265"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1062520 for CVE-2017-15265",
          "url": "https://bugzilla.suse.com/1062520"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-15265",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-15265"
    },
    {
      "cve": "CVE-2017-16536",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16536"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16536",
          "url": "https://www.suse.com/security/cve/CVE-2017-16536"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1066606 for CVE-2017-16536",
          "url": "https://bugzilla.suse.com/1066606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-16536",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2017-16536",
          "url": "https://bugzilla.suse.com/1146519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16536"
    },
    {
      "cve": "CVE-2017-16537",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16537"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16537",
          "url": "https://www.suse.com/security/cve/CVE-2017-16537"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1066573 for CVE-2017-16537",
          "url": "https://bugzilla.suse.com/1066573"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-16537",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2017-16537",
          "url": "https://bugzilla.suse.com/1146519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16537"
    },
    {
      "cve": "CVE-2017-16645",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16645"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16645",
          "url": "https://www.suse.com/security/cve/CVE-2017-16645"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1067132 for CVE-2017-16645",
          "url": "https://bugzilla.suse.com/1067132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-16645",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2017-16645",
          "url": "https://bugzilla.suse.com/1146519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16645"
    },
    {
      "cve": "CVE-2017-16646",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16646"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16646",
          "url": "https://www.suse.com/security/cve/CVE-2017-16646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1067105 for CVE-2017-16646",
          "url": "https://bugzilla.suse.com/1067105"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2017-16646",
          "url": "https://bugzilla.suse.com/1146519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16646"
    },
    {
      "cve": "CVE-2017-16647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16647",
          "url": "https://www.suse.com/security/cve/CVE-2017-16647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1067102 for CVE-2017-16647",
          "url": "https://bugzilla.suse.com/1067102"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2017-16647",
          "url": "https://bugzilla.suse.com/1146519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16647"
    },
    {
      "cve": "CVE-2017-16648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16648",
          "url": "https://www.suse.com/security/cve/CVE-2017-16648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1067087 for CVE-2017-16648",
          "url": "https://bugzilla.suse.com/1067087"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-16648",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2017-16648",
          "url": "https://bugzilla.suse.com/1146519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16648"
    },
    {
      "cve": "CVE-2017-16995",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16995"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16995",
          "url": "https://www.suse.com/security/cve/CVE-2017-16995"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-16995",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16995"
    },
    {
      "cve": "CVE-2017-16996",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16996"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16996",
          "url": "https://www.suse.com/security/cve/CVE-2017-16996"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-16996",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16996"
    },
    {
      "cve": "CVE-2017-17448",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17448"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17448",
          "url": "https://www.suse.com/security/cve/CVE-2017-17448"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1071693 for CVE-2017-17448",
          "url": "https://bugzilla.suse.com/1071693"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17448"
    },
    {
      "cve": "CVE-2017-17449",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17449"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17449",
          "url": "https://www.suse.com/security/cve/CVE-2017-17449"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1071694 for CVE-2017-17449",
          "url": "https://bugzilla.suse.com/1071694"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17449"
    },
    {
      "cve": "CVE-2017-17450",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17450"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17450",
          "url": "https://www.suse.com/security/cve/CVE-2017-17450"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1071695 for CVE-2017-17450",
          "url": "https://bugzilla.suse.com/1071695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074033 for CVE-2017-17450",
          "url": "https://bugzilla.suse.com/1074033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-17450",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17450"
    },
    {
      "cve": "CVE-2017-17852",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17852"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17852",
          "url": "https://www.suse.com/security/cve/CVE-2017-17852"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17852",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17852"
    },
    {
      "cve": "CVE-2017-17853",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17853"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17853",
          "url": "https://www.suse.com/security/cve/CVE-2017-17853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17853",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17853"
    },
    {
      "cve": "CVE-2017-17854",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17854"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17854",
          "url": "https://www.suse.com/security/cve/CVE-2017-17854"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17854",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17854"
    },
    {
      "cve": "CVE-2017-17855",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17855"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17855",
          "url": "https://www.suse.com/security/cve/CVE-2017-17855"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17855",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17855"
    },
    {
      "cve": "CVE-2017-17856",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17856"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17856",
          "url": "https://www.suse.com/security/cve/CVE-2017-17856"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17856",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17856"
    },
    {
      "cve": "CVE-2017-17857",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17857"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17857",
          "url": "https://www.suse.com/security/cve/CVE-2017-17857"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17857",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17857"
    },
    {
      "cve": "CVE-2017-17862",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17862"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17862",
          "url": "https://www.suse.com/security/cve/CVE-2017-17862"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17862",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17862"
    },
    {
      "cve": "CVE-2017-5123",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5123"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5123",
          "url": "https://www.suse.com/security/cve/CVE-2017-5123"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1062473 for CVE-2017-5123",
          "url": "https://bugzilla.suse.com/1062473"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1122971 for CVE-2017-5123",
          "url": "https://bugzilla.suse.com/1122971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5123"
    },
    {
      "cve": "CVE-2017-5715",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5715"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5715",
          "url": "https://www.suse.com/security/cve/CVE-2017-5715"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1068032 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1068032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074562 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074578 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074701 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074741 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074741"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074919 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074919"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075006 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1075006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075007 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1075007"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075262 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1075262"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075419 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1075419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076115 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1076115"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076372 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1076372"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076606 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1076606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1078353 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1078353"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1080039 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1080039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087887 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1087887"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087939 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1087939"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1088147 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1088147"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1089055 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1089055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1091815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1095735 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1095735"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1102517 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1102517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1105108 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1105108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1126516 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1126516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173489 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1173489"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201457 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1201457"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1201877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203236 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1203236"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5715"
    },
    {
      "cve": "CVE-2017-5753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5753",
          "url": "https://www.suse.com/security/cve/CVE-2017-5753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1068032 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1068032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074562 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1074562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074578 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1074578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074701 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1074701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075006 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1075006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075419 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1075419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075748 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1075748"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1080039 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1080039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087084 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1087084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087939 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1087939"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1089055 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1089055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136865 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1136865"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1201877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209547 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1209547"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5753"
    },
    {
      "cve": "CVE-2017-5754",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5754"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5754",
          "url": "https://www.suse.com/security/cve/CVE-2017-5754"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1068032 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1068032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074562 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1074562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074578 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1074578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074701 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1074701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075006 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1075006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075008 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1075008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087939 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1087939"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1089055 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1089055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115045 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1115045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136865 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1136865"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5754"
    },
    {
      "cve": "CVE-2017-7541",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7541"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7541",
          "url": "https://www.suse.com/security/cve/CVE-2017-7541"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1049645 for CVE-2017-7541",
          "url": "https://bugzilla.suse.com/1049645"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-7541"
    },
    {
      "cve": "CVE-2017-7542",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7542"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7542",
          "url": "https://www.suse.com/security/cve/CVE-2017-7542"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1049882 for CVE-2017-7542",
          "url": "https://bugzilla.suse.com/1049882"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1061936 for CVE-2017-7542",
          "url": "https://bugzilla.suse.com/1061936"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-7542"
    },
    {
      "cve": "CVE-2017-8824",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-8824"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-8824",
          "url": "https://www.suse.com/security/cve/CVE-2017-8824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1070771 for CVE-2017-8824",
          "url": "https://bugzilla.suse.com/1070771"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076734 for CVE-2017-8824",
          "url": "https://bugzilla.suse.com/1076734"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1092904 for CVE-2017-8824",
          "url": "https://bugzilla.suse.com/1092904"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-8824",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-8824"
    },
    {
      "cve": "CVE-2017-8831",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-8831"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-8831",
          "url": "https://www.suse.com/security/cve/CVE-2017-8831"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1037994 for CVE-2017-8831",
          "url": "https://bugzilla.suse.com/1037994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1061936 for CVE-2017-8831",
          "url": "https://bugzilla.suse.com/1061936"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-8831",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-8831",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-8831"
    },
    {
      "cve": "CVE-2018-1000004",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-1000004"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-1000004",
          "url": "https://www.suse.com/security/cve/CVE-2018-1000004"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076017 for CVE-2018-1000004",
          "url": "https://bugzilla.suse.com/1076017"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2018-1000004",
          "url": "https://bugzilla.suse.com/1091815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-1000004"
    },
    {
      "cve": "CVE-2018-10322",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-10322"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-10322",
          "url": "https://www.suse.com/security/cve/CVE-2018-10322"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-10322",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1090749 for CVE-2018-10322",
          "url": "https://bugzilla.suse.com/1090749"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-10322"
    },
    {
      "cve": "CVE-2018-10323",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-10323"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-10323",
          "url": "https://www.suse.com/security/cve/CVE-2018-10323"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-10323",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1090717 for CVE-2018-10323",
          "url": "https://bugzilla.suse.com/1090717"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-10323"
    },
    {
      "cve": "CVE-2018-1068",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-1068"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-1068",
          "url": "https://www.suse.com/security/cve/CVE-2018-1068"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1085107 for CVE-2018-1068",
          "url": "https://bugzilla.suse.com/1085107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1085114 for CVE-2018-1068",
          "url": "https://bugzilla.suse.com/1085114"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-1068",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1123903 for CVE-2018-1068",
          "url": "https://bugzilla.suse.com/1123903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-1068"
    },
    {
      "cve": "CVE-2018-1118",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-1118"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-1118",
          "url": "https://www.suse.com/security/cve/CVE-2018-1118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-1118",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1092472 for CVE-2018-1118",
          "url": "https://bugzilla.suse.com/1092472"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-1118"
    },
    {
      "cve": "CVE-2018-12232",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12232"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12232",
          "url": "https://www.suse.com/security/cve/CVE-2018-12232"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-12232",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1097593 for CVE-2018-12232",
          "url": "https://bugzilla.suse.com/1097593"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1125907 for CVE-2018-12232",
          "url": "https://bugzilla.suse.com/1125907"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1127757 for CVE-2018-12232",
          "url": "https://bugzilla.suse.com/1127757"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-12232"
    },
    {
      "cve": "CVE-2018-12714",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12714"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12714",
          "url": "https://www.suse.com/security/cve/CVE-2018-12714"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098933 for CVE-2018-12714",
          "url": "https://bugzilla.suse.com/1098933"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-12714"
    },
    {
      "cve": "CVE-2018-13053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-13053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-13053",
          "url": "https://www.suse.com/security/cve/CVE-2018-13053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1099924 for CVE-2018-13053",
          "url": "https://bugzilla.suse.com/1099924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2018-13053",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-13053"
    },
    {
      "cve": "CVE-2018-18710",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-18710"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-18710",
          "url": "https://www.suse.com/security/cve/CVE-2018-18710"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1113751 for CVE-2018-18710",
          "url": "https://bugzilla.suse.com/1113751"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-18710"
    },
    {
      "cve": "CVE-2018-19824",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-19824"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-19824",
          "url": "https://www.suse.com/security/cve/CVE-2018-19824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118152 for CVE-2018-19824",
          "url": "https://bugzilla.suse.com/1118152"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-19824"
    },
    {
      "cve": "CVE-2018-5332",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-5332"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-5332",
          "url": "https://www.suse.com/security/cve/CVE-2018-5332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075621 for CVE-2018-5332",
          "url": "https://bugzilla.suse.com/1075621"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2018-5332",
          "url": "https://bugzilla.suse.com/1091815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2018-5332",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-5332"
    },
    {
      "cve": "CVE-2018-5333",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-5333"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-5333",
          "url": "https://www.suse.com/security/cve/CVE-2018-5333"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075617 for CVE-2018-5333",
          "url": "https://bugzilla.suse.com/1075617"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2018-5333",
          "url": "https://bugzilla.suse.com/1091815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-5333"
    },
    {
      "cve": "CVE-2018-8043",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-8043"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-8043",
          "url": "https://www.suse.com/security/cve/CVE-2018-8043"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1084829 for CVE-2018-8043",
          "url": "https://bugzilla.suse.com/1084829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-8043"
    },
    {
      "cve": "CVE-2018-8087",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-8087"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-8087",
          "url": "https://www.suse.com/security/cve/CVE-2018-8087"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1085053 for CVE-2018-8087",
          "url": "https://bugzilla.suse.com/1085053"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-8087"
    },
    {
      "cve": "CVE-2018-8822",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-8822"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-8822",
          "url": "https://www.suse.com/security/cve/CVE-2018-8822"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1086162 for CVE-2018-8822",
          "url": "https://bugzilla.suse.com/1086162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1090404 for CVE-2018-8822",
          "url": "https://bugzilla.suse.com/1090404"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2018-8822",
          "url": "https://bugzilla.suse.com/1091815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-8822"
    },
    {
      "cve": "CVE-2019-10207",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-10207"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-10207",
          "url": "https://www.suse.com/security/cve/CVE-2019-10207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1123959 for CVE-2019-10207",
          "url": "https://bugzilla.suse.com/1123959"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1142857 for CVE-2019-10207",
          "url": "https://bugzilla.suse.com/1142857"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-10207"
    },
    {
      "cve": "CVE-2019-11477",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-11477"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-11477",
          "url": "https://www.suse.com/security/cve/CVE-2019-11477"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2019-11477",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1137586 for CVE-2019-11477",
          "url": "https://bugzilla.suse.com/1137586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1142129 for CVE-2019-11477",
          "url": "https://bugzilla.suse.com/1142129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1153242 for CVE-2019-11477",
          "url": "https://bugzilla.suse.com/1153242"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-11477"
    },
    {
      "cve": "CVE-2019-11478",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-11478"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-11478",
          "url": "https://www.suse.com/security/cve/CVE-2019-11478"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2019-11478",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1137586 for CVE-2019-11478",
          "url": "https://bugzilla.suse.com/1137586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1142129 for CVE-2019-11478",
          "url": "https://bugzilla.suse.com/1142129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1143542 for CVE-2019-11478",
          "url": "https://bugzilla.suse.com/1143542"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-11478"
    },
    {
      "cve": "CVE-2019-11479",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-11479"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-11479",
          "url": "https://www.suse.com/security/cve/CVE-2019-11479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2019-11479",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1137586 for CVE-2019-11479",
          "url": "https://bugzilla.suse.com/1137586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1142129 for CVE-2019-11479",
          "url": "https://bugzilla.suse.com/1142129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1143542 for CVE-2019-11479",
          "url": "https://bugzilla.suse.com/1143542"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-11479"
    },
    {
      "cve": "CVE-2019-14615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14615",
          "url": "https://www.suse.com/security/cve/CVE-2019-14615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160195 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1160195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165881 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1165881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14615"
    },
    {
      "cve": "CVE-2019-14814",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14814"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14814",
          "url": "https://www.suse.com/security/cve/CVE-2019-14814"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146512 for CVE-2019-14814",
          "url": "https://bugzilla.suse.com/1146512"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173664 for CVE-2019-14814",
          "url": "https://bugzilla.suse.com/1173664"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173665 for CVE-2019-14814",
          "url": "https://bugzilla.suse.com/1173665"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14814"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-15030",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15030"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15030",
          "url": "https://www.suse.com/security/cve/CVE-2019-15030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149713 for CVE-2019-15030",
          "url": "https://bugzilla.suse.com/1149713"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15030"
    },
    {
      "cve": "CVE-2019-15031",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15031"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15031",
          "url": "https://www.suse.com/security/cve/CVE-2019-15031"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149713 for CVE-2019-15031",
          "url": "https://bugzilla.suse.com/1149713"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15031"
    },
    {
      "cve": "CVE-2019-15098",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15098"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15098",
          "url": "https://www.suse.com/security/cve/CVE-2019-15098"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146378 for CVE-2019-15098",
          "url": "https://bugzilla.suse.com/1146378"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146543 for CVE-2019-15098",
          "url": "https://bugzilla.suse.com/1146543"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15098"
    },
    {
      "cve": "CVE-2019-15099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15099",
          "url": "https://www.suse.com/security/cve/CVE-2019-15099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146368 for CVE-2019-15099",
          "url": "https://bugzilla.suse.com/1146368"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15099"
    },
    {
      "cve": "CVE-2019-15290",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15290"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15290",
          "url": "https://www.suse.com/security/cve/CVE-2019-15290"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146378 for CVE-2019-15290",
          "url": "https://bugzilla.suse.com/1146378"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2019-15290",
          "url": "https://bugzilla.suse.com/1146519"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146543 for CVE-2019-15290",
          "url": "https://bugzilla.suse.com/1146543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-15290",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-15290",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15290"
    },
    {
      "cve": "CVE-2019-15504",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15504"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15504",
          "url": "https://www.suse.com/security/cve/CVE-2019-15504"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1147116 for CVE-2019-15504",
          "url": "https://bugzilla.suse.com/1147116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185852 for CVE-2019-15504",
          "url": "https://bugzilla.suse.com/1185852"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-15504"
    },
    {
      "cve": "CVE-2019-15902",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15902"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15902",
          "url": "https://www.suse.com/security/cve/CVE-2019-15902"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149376 for CVE-2019-15902",
          "url": "https://bugzilla.suse.com/1149376"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1155131 for CVE-2019-15902",
          "url": "https://bugzilla.suse.com/1155131"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15902"
    },
    {
      "cve": "CVE-2019-16231",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16231"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16231",
          "url": "https://www.suse.com/security/cve/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1150466 for CVE-2019-16231",
          "url": "https://bugzilla.suse.com/1150466"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16231"
    },
    {
      "cve": "CVE-2019-16232",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16232"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16232",
          "url": "https://www.suse.com/security/cve/CVE-2019-16232"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1150465 for CVE-2019-16232",
          "url": "https://bugzilla.suse.com/1150465"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16232"
    },
    {
      "cve": "CVE-2019-16234",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16234"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16234",
          "url": "https://www.suse.com/security/cve/CVE-2019-16234"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1150452 for CVE-2019-16234",
          "url": "https://bugzilla.suse.com/1150452"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-16234"
    },
    {
      "cve": "CVE-2019-17133",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17133"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17133",
          "url": "https://www.suse.com/security/cve/CVE-2019-17133"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1153158 for CVE-2019-17133",
          "url": "https://bugzilla.suse.com/1153158"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1153161 for CVE-2019-17133",
          "url": "https://bugzilla.suse.com/1153161"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-17133"
    },
    {
      "cve": "CVE-2019-17666",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17666"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17666",
          "url": "https://www.suse.com/security/cve/CVE-2019-17666"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1154372 for CVE-2019-17666",
          "url": "https://bugzilla.suse.com/1154372"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-17666"
    },
    {
      "cve": "CVE-2019-18808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18808",
          "url": "https://www.suse.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156259 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1156259"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18808"
    },
    {
      "cve": "CVE-2019-18812",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18812"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18812",
          "url": "https://www.suse.com/security/cve/CVE-2019-18812"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156277 for CVE-2019-18812",
          "url": "https://bugzilla.suse.com/1156277"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18812"
    },
    {
      "cve": "CVE-2019-18813",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18813"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18813",
          "url": "https://www.suse.com/security/cve/CVE-2019-18813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156278 for CVE-2019-18813",
          "url": "https://bugzilla.suse.com/1156278"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18813"
    },
    {
      "cve": "CVE-2019-19252",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19252"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19252",
          "url": "https://www.suse.com/security/cve/CVE-2019-19252"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157813 for CVE-2019-19252",
          "url": "https://bugzilla.suse.com/1157813"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19252"
    },
    {
      "cve": "CVE-2019-19332",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19332"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19332",
          "url": "https://www.suse.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158827 for CVE-2019-19332",
          "url": "https://bugzilla.suse.com/1158827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19332"
    },
    {
      "cve": "CVE-2019-19338",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19338"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19338",
          "url": "https://www.suse.com/security/cve/CVE-2019-19338"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158954 for CVE-2019-19338",
          "url": "https://bugzilla.suse.com/1158954"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19338"
    },
    {
      "cve": "CVE-2019-3016",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3016"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3016",
          "url": "https://www.suse.com/security/cve/CVE-2019-3016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2019-3016",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161154 for CVE-2019-3016",
          "url": "https://bugzilla.suse.com/1161154"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3016"
    },
    {
      "cve": "CVE-2019-3846",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3846"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3846",
          "url": "https://www.suse.com/security/cve/CVE-2019-3846"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136424 for CVE-2019-3846",
          "url": "https://bugzilla.suse.com/1136424"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136446 for CVE-2019-3846",
          "url": "https://bugzilla.suse.com/1136446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156330 for CVE-2019-3846",
          "url": "https://bugzilla.suse.com/1156330"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3846"
    },
    {
      "cve": "CVE-2019-3882",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3882"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3882",
          "url": "https://www.suse.com/security/cve/CVE-2019-3882"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1131416 for CVE-2019-3882",
          "url": "https://bugzilla.suse.com/1131416"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1131427 for CVE-2019-3882",
          "url": "https://bugzilla.suse.com/1131427"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133319 for CVE-2019-3882",
          "url": "https://bugzilla.suse.com/1133319"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3882"
    },
    {
      "cve": "CVE-2019-3887",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3887"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3887",
          "url": "https://www.suse.com/security/cve/CVE-2019-3887"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1131800 for CVE-2019-3887",
          "url": "https://bugzilla.suse.com/1131800"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3887"
    },
    {
      "cve": "CVE-2019-6974",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-6974"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-6974",
          "url": "https://www.suse.com/security/cve/CVE-2019-6974"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1124728 for CVE-2019-6974",
          "url": "https://bugzilla.suse.com/1124728"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1124729 for CVE-2019-6974",
          "url": "https://bugzilla.suse.com/1124729"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-6974"
    },
    {
      "cve": "CVE-2019-7221",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-7221"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-7221",
          "url": "https://www.suse.com/security/cve/CVE-2019-7221"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1124732 for CVE-2019-7221",
          "url": "https://bugzilla.suse.com/1124732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1124734 for CVE-2019-7221",
          "url": "https://bugzilla.suse.com/1124734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-7221"
    },
    {
      "cve": "CVE-2019-7222",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-7222"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-7222",
          "url": "https://www.suse.com/security/cve/CVE-2019-7222"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1124735 for CVE-2019-7222",
          "url": "https://bugzilla.suse.com/1124735"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-7222"
    },
    {
      "cve": "CVE-2019-8564",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-8564"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-8564",
          "url": "https://www.suse.com/security/cve/CVE-2019-8564"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132673 for CVE-2019-8564",
          "url": "https://bugzilla.suse.com/1132673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132828 for CVE-2019-8564",
          "url": "https://bugzilla.suse.com/1132828"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-8564"
    },
    {
      "cve": "CVE-2019-8912",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-8912"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-8912",
          "url": "https://www.suse.com/security/cve/CVE-2019-8912"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1125907 for CVE-2019-8912",
          "url": "https://bugzilla.suse.com/1125907"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1126284 for CVE-2019-8912",
          "url": "https://bugzilla.suse.com/1126284"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-8912"
    },
    {
      "cve": "CVE-2019-9500",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-9500"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-9500",
          "url": "https://www.suse.com/security/cve/CVE-2019-9500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132681 for CVE-2019-9500",
          "url": "https://bugzilla.suse.com/1132681"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-9500"
    },
    {
      "cve": "CVE-2020-10135",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10135"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10135",
          "url": "https://www.suse.com/security/cve/CVE-2020-10135"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171988 for CVE-2020-10135",
          "url": "https://bugzilla.suse.com/1171988"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10135"
    },
    {
      "cve": "CVE-2020-10766",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10766"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10766",
          "url": "https://www.suse.com/security/cve/CVE-2020-10766"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-10766",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172781 for CVE-2020-10766",
          "url": "https://bugzilla.suse.com/1172781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10766"
    },
    {
      "cve": "CVE-2020-10767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10767",
          "url": "https://www.suse.com/security/cve/CVE-2020-10767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-10767",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172782 for CVE-2020-10767",
          "url": "https://bugzilla.suse.com/1172782"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10767"
    },
    {
      "cve": "CVE-2020-10768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10768",
          "url": "https://www.suse.com/security/cve/CVE-2020-10768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-10768",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172783 for CVE-2020-10768",
          "url": "https://bugzilla.suse.com/1172783"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10768"
    },
    {
      "cve": "CVE-2020-12351",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12351"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12351",
          "url": "https://www.suse.com/security/cve/CVE-2020-12351"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177724 for CVE-2020-12351",
          "url": "https://bugzilla.suse.com/1177724"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177729 for CVE-2020-12351",
          "url": "https://bugzilla.suse.com/1177729"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178397 for CVE-2020-12351",
          "url": "https://bugzilla.suse.com/1178397"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-12351"
    },
    {
      "cve": "CVE-2020-12352",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12352"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12352",
          "url": "https://www.suse.com/security/cve/CVE-2020-12352"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177725 for CVE-2020-12352",
          "url": "https://bugzilla.suse.com/1177725"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178398 for CVE-2020-12352",
          "url": "https://bugzilla.suse.com/1178398"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12352"
    },
    {
      "cve": "CVE-2020-14331",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14331"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14331",
          "url": "https://www.suse.com/security/cve/CVE-2020-14331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174205 for CVE-2020-14331",
          "url": "https://bugzilla.suse.com/1174205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174247 for CVE-2020-14331",
          "url": "https://bugzilla.suse.com/1174247"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-14331"
    },
    {
      "cve": "CVE-2020-14386",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14386"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14386",
          "url": "https://www.suse.com/security/cve/CVE-2020-14386"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176069 for CVE-2020-14386",
          "url": "https://bugzilla.suse.com/1176069"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176072 for CVE-2020-14386",
          "url": "https://bugzilla.suse.com/1176072"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-14386"
    },
    {
      "cve": "CVE-2020-24586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-24586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-24586",
          "url": "https://www.suse.com/security/cve/CVE-2020-24586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185859 for CVE-2020-24586",
          "url": "https://bugzilla.suse.com/1185859"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192868 for CVE-2020-24586",
          "url": "https://bugzilla.suse.com/1192868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-24586"
    },
    {
      "cve": "CVE-2020-24587",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-24587"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-24587",
          "url": "https://www.suse.com/security/cve/CVE-2020-24587"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185859 for CVE-2020-24587",
          "url": "https://bugzilla.suse.com/1185859"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185862 for CVE-2020-24587",
          "url": "https://bugzilla.suse.com/1185862"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192868 for CVE-2020-24587",
          "url": "https://bugzilla.suse.com/1192868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-24587"
    },
    {
      "cve": "CVE-2020-24588",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-24588"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-24588",
          "url": "https://www.suse.com/security/cve/CVE-2020-24588"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185861 for CVE-2020-24588",
          "url": "https://bugzilla.suse.com/1185861"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192868 for CVE-2020-24588",
          "url": "https://bugzilla.suse.com/1192868"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199701 for CVE-2020-24588",
          "url": "https://bugzilla.suse.com/1199701"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-24588"
    },
    {
      "cve": "CVE-2020-25639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25639",
          "url": "https://www.suse.com/security/cve/CVE-2020-25639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176846 for CVE-2020-25639",
          "url": "https://bugzilla.suse.com/1176846"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25639"
    },
    {
      "cve": "CVE-2020-25656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25656",
          "url": "https://www.suse.com/security/cve/CVE-2020-25656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177766 for CVE-2020-25656",
          "url": "https://bugzilla.suse.com/1177766"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25656"
    },
    {
      "cve": "CVE-2020-25668",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25668"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25668",
          "url": "https://www.suse.com/security/cve/CVE-2020-25668"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178123 for CVE-2020-25668",
          "url": "https://bugzilla.suse.com/1178123"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178622 for CVE-2020-25668",
          "url": "https://bugzilla.suse.com/1178622"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2020-25668",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-25668"
    },
    {
      "cve": "CVE-2020-26141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-26141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-26141",
          "url": "https://www.suse.com/security/cve/CVE-2020-26141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185987 for CVE-2020-26141",
          "url": "https://bugzilla.suse.com/1185987"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-26141"
    },
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-29660",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29660"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29660",
          "url": "https://www.suse.com/security/cve/CVE-2020-29660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179745 for CVE-2020-29660",
          "url": "https://bugzilla.suse.com/1179745"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179877 for CVE-2020-29660",
          "url": "https://bugzilla.suse.com/1179877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-29660"
    },
    {
      "cve": "CVE-2020-29661",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29661"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29661",
          "url": "https://www.suse.com/security/cve/CVE-2020-29661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179745 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1179745"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179877 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1179877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214268 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1214268"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218966 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1218966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-29661"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8694",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8694"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8694",
          "url": "https://www.suse.com/security/cve/CVE-2020-8694"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170415 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1170415"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170446 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1170446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178591 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1178591"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178700 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1178700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179661 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1179661"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8694"
    },
    {
      "cve": "CVE-2021-23133",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-23133"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-23133",
          "url": "https://www.suse.com/security/cve/CVE-2021-23133"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184675 for CVE-2021-23133",
          "url": "https://bugzilla.suse.com/1184675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185901 for CVE-2021-23133",
          "url": "https://bugzilla.suse.com/1185901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-23133"
    },
    {
      "cve": "CVE-2021-26708",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-26708"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-26708",
          "url": "https://www.suse.com/security/cve/CVE-2021-26708"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1181806 for CVE-2021-26708",
          "url": "https://bugzilla.suse.com/1181806"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1183298 for CVE-2021-26708",
          "url": "https://bugzilla.suse.com/1183298"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-26708"
    },
    {
      "cve": "CVE-2021-28971",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-28971"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-28971",
          "url": "https://www.suse.com/security/cve/CVE-2021-28971"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184196 for CVE-2021-28971",
          "url": "https://bugzilla.suse.com/1184196"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-28971"
    },
    {
      "cve": "CVE-2021-32606",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-32606"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-32606",
          "url": "https://www.suse.com/security/cve/CVE-2021-32606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185953 for CVE-2021-32606",
          "url": "https://bugzilla.suse.com/1185953"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-32606"
    },
    {
      "cve": "CVE-2021-33909",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33909"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33909",
          "url": "https://www.suse.com/security/cve/CVE-2021-33909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188062 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188063 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188063"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188257 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188257"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189302 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1189302"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190859 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1190859"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-3483",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3483"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3483",
          "url": "https://www.suse.com/security/cve/CVE-2021-3483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184393 for CVE-2021-3483",
          "url": "https://bugzilla.suse.com/1184393"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3483"
    },
    {
      "cve": "CVE-2021-3489",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3489"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3489",
          "url": "https://www.suse.com/security/cve/CVE-2021-3489"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185640 for CVE-2021-3489",
          "url": "https://bugzilla.suse.com/1185640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185856 for CVE-2021-3489",
          "url": "https://bugzilla.suse.com/1185856"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3489"
    },
    {
      "cve": "CVE-2021-3490",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3490"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3490",
          "url": "https://www.suse.com/security/cve/CVE-2021-3490"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185641 for CVE-2021-3490",
          "url": "https://bugzilla.suse.com/1185641"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185796 for CVE-2021-3490",
          "url": "https://bugzilla.suse.com/1185796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3490"
    },
    {
      "cve": "CVE-2021-3491",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3491"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3491",
          "url": "https://www.suse.com/security/cve/CVE-2021-3491"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185642 for CVE-2021-3491",
          "url": "https://bugzilla.suse.com/1185642"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187090 for CVE-2021-3491",
          "url": "https://bugzilla.suse.com/1187090"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3491"
    },
    {
      "cve": "CVE-2021-3640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3640",
          "url": "https://www.suse.com/security/cve/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188172 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188172"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188613 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191530 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1191530"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3640"
    },
    {
      "cve": "CVE-2021-3653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3653",
          "url": "https://www.suse.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189399 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189399"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189420 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189420"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3653"
    },
    {
      "cve": "CVE-2021-3656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3656",
          "url": "https://www.suse.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189400 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189400"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189418 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189418"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3656"
    },
    {
      "cve": "CVE-2021-3744",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3744"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3744",
          "url": "https://www.suse.com/security/cve/CVE-2021-3744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2021-3744",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2021-3744",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3744"
    },
    {
      "cve": "CVE-2021-3753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3753",
          "url": "https://www.suse.com/security/cve/CVE-2021-3753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190025 for CVE-2021-3753",
          "url": "https://bugzilla.suse.com/1190025"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3753"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    },
    {
      "cve": "CVE-2021-3759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3759",
          "url": "https://www.suse.com/security/cve/CVE-2021-3759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190115 for CVE-2021-3759",
          "url": "https://bugzilla.suse.com/1190115"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3759"
    },
    {
      "cve": "CVE-2021-38166",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38166"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38166",
          "url": "https://www.suse.com/security/cve/CVE-2021-38166"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189233 for CVE-2021-38166",
          "url": "https://bugzilla.suse.com/1189233"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38166"
    }
  ]
}
  opensuse-su-2024:13704-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "kernel-devel-longterm-6.6.17-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-13704",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13704-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-3695 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-3695/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-1000251 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-1000251/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-12153 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-12153/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-13080 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-13080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-14051 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-14051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-15129 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-15129/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-15265 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-15265/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16536 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16536/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16537 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16537/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16645 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16645/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16646 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16646/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16647 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16648 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16995 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16995/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-16996 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-16996/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17448 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17448/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17449 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17449/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17450 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17450/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17852 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17852/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17853 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17853/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17854 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17854/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17855 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17855/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17856 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17856/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17857 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17857/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-17862 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-17862/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5123 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5123/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5715 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5715/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5753 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5754 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5754/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7541 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7541/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7542 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7542/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-8824 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-8824/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-8831 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-8831/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-1000004 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-10322 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-10322/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-10323 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-10323/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-1068 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-1068/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-1118 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-1118/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12232 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12232/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-12714 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-12714/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-13053 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-13053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-18710 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-18710/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-19824 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-19824/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-5332 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-5332/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-5333 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-5333/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-8043 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-8043/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-8087 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-8087/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-8822 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-8822/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-10207 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-10207/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-11477 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-11477/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-11478 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-11478/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-11479 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-11479/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14615 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14615/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14814 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14814/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14896 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14896/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15030 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15030/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15031 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15031/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15098 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15098/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15099 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15099/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15290 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15290/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15504 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15504/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15902 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15902/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16231 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16231/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16232 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16232/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-16234 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-16234/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17133 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17133/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17666 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17666/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18808 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18812 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18812/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-18813 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-18813/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19252 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19252/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19332 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19332/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19338 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19338/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3016 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3016/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3846 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3846/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3882 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3882/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-3887 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-3887/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-6974 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-6974/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-7221 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-7221/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-7222 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-7222/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-8564 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-8564/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-8912 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-8912/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-9500 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-9500/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10135 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10135/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10766 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10766/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10767 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10768 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12351 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12351/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12352 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12352/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14331 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14331/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-14386 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-14386/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-24586 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-24586/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-24587 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-24587/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-24588 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-24588/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25639 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25656 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-25668 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-25668/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-26141 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-26141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-2732 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-2732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29660 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29660/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-29661 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-29661/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8694 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8694/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-23133 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-23133/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-26708 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-26708/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-28971 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-28971/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-32606 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-32606/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-33909 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-33909/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3483 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3483/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3489 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3489/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3490 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3490/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3491 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3491/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3542 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3542/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3640 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3653 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3656 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3744 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3744/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3753 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-37576 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-37576/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3759 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38166 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38166/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-43976 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-43976/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0185 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0185/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0330 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0330/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0847 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0847/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0886 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0886/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1462 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1462/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1516 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1516/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1679 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1729 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1729/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1852 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1852/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1966 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1966/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1972 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1972/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1973 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1973/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-22942 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-22942/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2308 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2308/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-24958 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-24958/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2588 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2588/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2590 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2590/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-26490 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-26490/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28388 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28388/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28389 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28389/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28390 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28390/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-28893 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-28893/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-29900 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-29900/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-29901 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-29901/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-29968 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-29968/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3424 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3424/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-34918 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-34918/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3628 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3628/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3640 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-40982 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-40982/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41218 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41218/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-41674 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-41674/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42719 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42719/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42720 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42720/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42721 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42721/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-42722 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-42722/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-4379 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-4379/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-44032 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-44032/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-44033 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-44033/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-44034 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-44034/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-45884 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-45884/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-45885 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-45885/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-45886 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-45886/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-45887 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-45887/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-45888 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-45888/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-45919 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-45919/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-45934 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-45934/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-0045 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-0045/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-1076 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-1076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-1078 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-1078/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-1192 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-1192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-1380 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-1380/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-20569 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-20569/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-20593 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-20593/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-2124 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-2124/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-31084 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-31084/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-3141 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-3141/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-3269 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-3269/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-39192 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-39192/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-39193 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-39193/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-4128 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-4128/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-4134 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-4134/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-4194 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-4194/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-42753 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-42753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-42754 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-42754/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-42756 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-42756/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-4623 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-4623/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-46813 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-46813/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-4881 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-4881/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-5345 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-5345/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-6606 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-6606/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-6610 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-6610/"
      }
    ],
    "title": "kernel-devel-longterm-6.6.17-1.1 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:13704-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-longterm-6.6.17-1.1.aarch64",
                "product": {
                  "name": "kernel-devel-longterm-6.6.17-1.1.aarch64",
                  "product_id": "kernel-devel-longterm-6.6.17-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-longterm-6.6.17-1.1.aarch64",
                "product": {
                  "name": "kernel-source-longterm-6.6.17-1.1.aarch64",
                  "product_id": "kernel-source-longterm-6.6.17-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le",
                "product": {
                  "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le",
                  "product_id": "kernel-devel-longterm-6.6.17-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-longterm-6.6.17-1.1.ppc64le",
                "product": {
                  "name": "kernel-source-longterm-6.6.17-1.1.ppc64le",
                  "product_id": "kernel-source-longterm-6.6.17-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-longterm-6.6.17-1.1.s390x",
                "product": {
                  "name": "kernel-devel-longterm-6.6.17-1.1.s390x",
                  "product_id": "kernel-devel-longterm-6.6.17-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-longterm-6.6.17-1.1.s390x",
                "product": {
                  "name": "kernel-source-longterm-6.6.17-1.1.s390x",
                  "product_id": "kernel-source-longterm-6.6.17-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-longterm-6.6.17-1.1.x86_64",
                "product": {
                  "name": "kernel-devel-longterm-6.6.17-1.1.x86_64",
                  "product_id": "kernel-devel-longterm-6.6.17-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-longterm-6.6.17-1.1.x86_64",
                "product": {
                  "name": "kernel-source-longterm-6.6.17-1.1.x86_64",
                  "product_id": "kernel-source-longterm-6.6.17-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64"
        },
        "product_reference": "kernel-devel-longterm-6.6.17-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le"
        },
        "product_reference": "kernel-devel-longterm-6.6.17-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x"
        },
        "product_reference": "kernel-devel-longterm-6.6.17-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64"
        },
        "product_reference": "kernel-devel-longterm-6.6.17-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64"
        },
        "product_reference": "kernel-source-longterm-6.6.17-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le"
        },
        "product_reference": "kernel-source-longterm-6.6.17-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x"
        },
        "product_reference": "kernel-source-longterm-6.6.17-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        },
        "product_reference": "kernel-source-longterm-6.6.17-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-3695",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-3695"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-3695",
          "url": "https://www.suse.com/security/cve/CVE-2016-3695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1023051 for CVE-2016-3695",
          "url": "https://bugzilla.suse.com/1023051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-3695"
    },
    {
      "cve": "CVE-2017-1000251",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-1000251"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-1000251",
          "url": "https://www.suse.com/security/cve/CVE-2017-1000251"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1057389 for CVE-2017-1000251",
          "url": "https://bugzilla.suse.com/1057389"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1057950 for CVE-2017-1000251",
          "url": "https://bugzilla.suse.com/1057950"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1070535 for CVE-2017-1000251",
          "url": "https://bugzilla.suse.com/1070535"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1072117 for CVE-2017-1000251",
          "url": "https://bugzilla.suse.com/1072117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1072162 for CVE-2017-1000251",
          "url": "https://bugzilla.suse.com/1072162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1120758 for CVE-2017-1000251",
          "url": "https://bugzilla.suse.com/1120758"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-1000251"
    },
    {
      "cve": "CVE-2017-12153",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-12153"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-12153",
          "url": "https://www.suse.com/security/cve/CVE-2017-12153"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1058410 for CVE-2017-12153",
          "url": "https://bugzilla.suse.com/1058410"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1058624 for CVE-2017-12153",
          "url": "https://bugzilla.suse.com/1058624"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-12153"
    },
    {
      "cve": "CVE-2017-13080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-13080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-13080",
          "url": "https://www.suse.com/security/cve/CVE-2017-13080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1056061 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1056061"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1063479 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1063479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1063667 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1063667"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1063671 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1063671"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1066295 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1066295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1105108 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1105108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178872 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1178872"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179588 for CVE-2017-13080",
          "url": "https://bugzilla.suse.com/1179588"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-13080"
    },
    {
      "cve": "CVE-2017-14051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-14051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-14051",
          "url": "https://www.suse.com/security/cve/CVE-2017-14051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1056588 for CVE-2017-14051",
          "url": "https://bugzilla.suse.com/1056588"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-14051"
    },
    {
      "cve": "CVE-2017-15129",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-15129"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-15129",
          "url": "https://www.suse.com/security/cve/CVE-2017-15129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074839 for CVE-2017-15129",
          "url": "https://bugzilla.suse.com/1074839"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-15129"
    },
    {
      "cve": "CVE-2017-15265",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-15265"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-15265",
          "url": "https://www.suse.com/security/cve/CVE-2017-15265"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1062520 for CVE-2017-15265",
          "url": "https://bugzilla.suse.com/1062520"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-15265",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2017-15265"
    },
    {
      "cve": "CVE-2017-16536",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16536"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16536",
          "url": "https://www.suse.com/security/cve/CVE-2017-16536"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1066606 for CVE-2017-16536",
          "url": "https://bugzilla.suse.com/1066606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-16536",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2017-16536",
          "url": "https://bugzilla.suse.com/1146519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16536"
    },
    {
      "cve": "CVE-2017-16537",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16537"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16537",
          "url": "https://www.suse.com/security/cve/CVE-2017-16537"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1066573 for CVE-2017-16537",
          "url": "https://bugzilla.suse.com/1066573"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-16537",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2017-16537",
          "url": "https://bugzilla.suse.com/1146519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16537"
    },
    {
      "cve": "CVE-2017-16645",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16645"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16645",
          "url": "https://www.suse.com/security/cve/CVE-2017-16645"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1067132 for CVE-2017-16645",
          "url": "https://bugzilla.suse.com/1067132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-16645",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2017-16645",
          "url": "https://bugzilla.suse.com/1146519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16645"
    },
    {
      "cve": "CVE-2017-16646",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16646"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16646",
          "url": "https://www.suse.com/security/cve/CVE-2017-16646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1067105 for CVE-2017-16646",
          "url": "https://bugzilla.suse.com/1067105"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2017-16646",
          "url": "https://bugzilla.suse.com/1146519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16646"
    },
    {
      "cve": "CVE-2017-16647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16647",
          "url": "https://www.suse.com/security/cve/CVE-2017-16647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1067102 for CVE-2017-16647",
          "url": "https://bugzilla.suse.com/1067102"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2017-16647",
          "url": "https://bugzilla.suse.com/1146519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16647"
    },
    {
      "cve": "CVE-2017-16648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16648",
          "url": "https://www.suse.com/security/cve/CVE-2017-16648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1067087 for CVE-2017-16648",
          "url": "https://bugzilla.suse.com/1067087"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-16648",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2017-16648",
          "url": "https://bugzilla.suse.com/1146519"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16648"
    },
    {
      "cve": "CVE-2017-16995",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16995"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16995",
          "url": "https://www.suse.com/security/cve/CVE-2017-16995"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-16995",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16995"
    },
    {
      "cve": "CVE-2017-16996",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-16996"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-16996",
          "url": "https://www.suse.com/security/cve/CVE-2017-16996"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-16996",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-16996"
    },
    {
      "cve": "CVE-2017-17448",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17448"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17448",
          "url": "https://www.suse.com/security/cve/CVE-2017-17448"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1071693 for CVE-2017-17448",
          "url": "https://bugzilla.suse.com/1071693"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17448"
    },
    {
      "cve": "CVE-2017-17449",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17449"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17449",
          "url": "https://www.suse.com/security/cve/CVE-2017-17449"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1071694 for CVE-2017-17449",
          "url": "https://bugzilla.suse.com/1071694"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17449"
    },
    {
      "cve": "CVE-2017-17450",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17450"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17450",
          "url": "https://www.suse.com/security/cve/CVE-2017-17450"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1071695 for CVE-2017-17450",
          "url": "https://bugzilla.suse.com/1071695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074033 for CVE-2017-17450",
          "url": "https://bugzilla.suse.com/1074033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-17450",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17450"
    },
    {
      "cve": "CVE-2017-17852",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17852"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17852",
          "url": "https://www.suse.com/security/cve/CVE-2017-17852"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17852",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17852"
    },
    {
      "cve": "CVE-2017-17853",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17853"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17853",
          "url": "https://www.suse.com/security/cve/CVE-2017-17853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17853",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17853"
    },
    {
      "cve": "CVE-2017-17854",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17854"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17854",
          "url": "https://www.suse.com/security/cve/CVE-2017-17854"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17854",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17854"
    },
    {
      "cve": "CVE-2017-17855",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17855"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17855",
          "url": "https://www.suse.com/security/cve/CVE-2017-17855"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17855",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17855"
    },
    {
      "cve": "CVE-2017-17856",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17856"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17856",
          "url": "https://www.suse.com/security/cve/CVE-2017-17856"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17856",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17856"
    },
    {
      "cve": "CVE-2017-17857",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17857"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17857",
          "url": "https://www.suse.com/security/cve/CVE-2017-17857"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17857",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17857"
    },
    {
      "cve": "CVE-2017-17862",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-17862"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-17862",
          "url": "https://www.suse.com/security/cve/CVE-2017-17862"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1073928 for CVE-2017-17862",
          "url": "https://bugzilla.suse.com/1073928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-17862"
    },
    {
      "cve": "CVE-2017-5123",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5123"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5123",
          "url": "https://www.suse.com/security/cve/CVE-2017-5123"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1062473 for CVE-2017-5123",
          "url": "https://bugzilla.suse.com/1062473"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1122971 for CVE-2017-5123",
          "url": "https://bugzilla.suse.com/1122971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5123"
    },
    {
      "cve": "CVE-2017-5715",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5715"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5715",
          "url": "https://www.suse.com/security/cve/CVE-2017-5715"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1068032 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1068032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074562 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074578 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074701 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074741 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074741"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074919 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1074919"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075006 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1075006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075007 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1075007"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075262 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1075262"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075419 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1075419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076115 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1076115"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076372 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1076372"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076606 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1076606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1078353 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1078353"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1080039 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1080039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087887 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1087887"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087939 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1087939"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1088147 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1088147"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1089055 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1089055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1091815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1095735 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1095735"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1102517 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1102517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1105108 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1105108"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1126516 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1126516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173489 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1173489"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201457 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1201457"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1201877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203236 for CVE-2017-5715",
          "url": "https://bugzilla.suse.com/1203236"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5715"
    },
    {
      "cve": "CVE-2017-5753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5753",
          "url": "https://www.suse.com/security/cve/CVE-2017-5753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1068032 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1068032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074562 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1074562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074578 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1074578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074701 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1074701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075006 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1075006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075419 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1075419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075748 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1075748"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1080039 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1080039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087084 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1087084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087939 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1087939"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1089055 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1089055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136865 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1136865"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1201877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209547 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1209547"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5753"
    },
    {
      "cve": "CVE-2017-5754",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5754"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5754",
          "url": "https://www.suse.com/security/cve/CVE-2017-5754"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1068032 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1068032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074562 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1074562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074578 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1074578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074701 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1074701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075006 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1075006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075008 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1075008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087939 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1087939"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1089055 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1089055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115045 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1115045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136865 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1136865"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2017-5754",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5754"
    },
    {
      "cve": "CVE-2017-7541",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7541"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7541",
          "url": "https://www.suse.com/security/cve/CVE-2017-7541"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1049645 for CVE-2017-7541",
          "url": "https://bugzilla.suse.com/1049645"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-7541"
    },
    {
      "cve": "CVE-2017-7542",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7542"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7542",
          "url": "https://www.suse.com/security/cve/CVE-2017-7542"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1049882 for CVE-2017-7542",
          "url": "https://bugzilla.suse.com/1049882"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1061936 for CVE-2017-7542",
          "url": "https://bugzilla.suse.com/1061936"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-7542"
    },
    {
      "cve": "CVE-2017-8824",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-8824"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-8824",
          "url": "https://www.suse.com/security/cve/CVE-2017-8824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1070771 for CVE-2017-8824",
          "url": "https://bugzilla.suse.com/1070771"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076734 for CVE-2017-8824",
          "url": "https://bugzilla.suse.com/1076734"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1092904 for CVE-2017-8824",
          "url": "https://bugzilla.suse.com/1092904"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-8824",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-8824"
    },
    {
      "cve": "CVE-2017-8831",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-8831"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-8831",
          "url": "https://www.suse.com/security/cve/CVE-2017-8831"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1037994 for CVE-2017-8831",
          "url": "https://bugzilla.suse.com/1037994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1061936 for CVE-2017-8831",
          "url": "https://bugzilla.suse.com/1061936"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2017-8831",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2017-8831",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-8831"
    },
    {
      "cve": "CVE-2018-1000004",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-1000004"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-1000004",
          "url": "https://www.suse.com/security/cve/CVE-2018-1000004"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1076017 for CVE-2018-1000004",
          "url": "https://bugzilla.suse.com/1076017"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2018-1000004",
          "url": "https://bugzilla.suse.com/1091815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-1000004"
    },
    {
      "cve": "CVE-2018-10322",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-10322"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-10322",
          "url": "https://www.suse.com/security/cve/CVE-2018-10322"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-10322",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1090749 for CVE-2018-10322",
          "url": "https://bugzilla.suse.com/1090749"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-10322"
    },
    {
      "cve": "CVE-2018-10323",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-10323"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-10323",
          "url": "https://www.suse.com/security/cve/CVE-2018-10323"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-10323",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1090717 for CVE-2018-10323",
          "url": "https://bugzilla.suse.com/1090717"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-10323"
    },
    {
      "cve": "CVE-2018-1068",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-1068"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-1068",
          "url": "https://www.suse.com/security/cve/CVE-2018-1068"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1085107 for CVE-2018-1068",
          "url": "https://bugzilla.suse.com/1085107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1085114 for CVE-2018-1068",
          "url": "https://bugzilla.suse.com/1085114"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-1068",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1123903 for CVE-2018-1068",
          "url": "https://bugzilla.suse.com/1123903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-1068"
    },
    {
      "cve": "CVE-2018-1118",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-1118"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-1118",
          "url": "https://www.suse.com/security/cve/CVE-2018-1118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-1118",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1092472 for CVE-2018-1118",
          "url": "https://bugzilla.suse.com/1092472"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-1118"
    },
    {
      "cve": "CVE-2018-12232",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12232"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12232",
          "url": "https://www.suse.com/security/cve/CVE-2018-12232"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087082 for CVE-2018-12232",
          "url": "https://bugzilla.suse.com/1087082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1097593 for CVE-2018-12232",
          "url": "https://bugzilla.suse.com/1097593"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1125907 for CVE-2018-12232",
          "url": "https://bugzilla.suse.com/1125907"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1127757 for CVE-2018-12232",
          "url": "https://bugzilla.suse.com/1127757"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-12232"
    },
    {
      "cve": "CVE-2018-12714",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-12714"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-12714",
          "url": "https://www.suse.com/security/cve/CVE-2018-12714"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1098933 for CVE-2018-12714",
          "url": "https://bugzilla.suse.com/1098933"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2018-12714"
    },
    {
      "cve": "CVE-2018-13053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-13053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-13053",
          "url": "https://www.suse.com/security/cve/CVE-2018-13053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1099924 for CVE-2018-13053",
          "url": "https://bugzilla.suse.com/1099924"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2018-13053",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-13053"
    },
    {
      "cve": "CVE-2018-18710",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-18710"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-18710",
          "url": "https://www.suse.com/security/cve/CVE-2018-18710"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1113751 for CVE-2018-18710",
          "url": "https://bugzilla.suse.com/1113751"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-18710"
    },
    {
      "cve": "CVE-2018-19824",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-19824"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-19824",
          "url": "https://www.suse.com/security/cve/CVE-2018-19824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118152 for CVE-2018-19824",
          "url": "https://bugzilla.suse.com/1118152"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-19824"
    },
    {
      "cve": "CVE-2018-5332",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-5332"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-5332",
          "url": "https://www.suse.com/security/cve/CVE-2018-5332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075621 for CVE-2018-5332",
          "url": "https://bugzilla.suse.com/1075621"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2018-5332",
          "url": "https://bugzilla.suse.com/1091815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1115893 for CVE-2018-5332",
          "url": "https://bugzilla.suse.com/1115893"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-5332"
    },
    {
      "cve": "CVE-2018-5333",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-5333"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-5333",
          "url": "https://www.suse.com/security/cve/CVE-2018-5333"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075617 for CVE-2018-5333",
          "url": "https://bugzilla.suse.com/1075617"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2018-5333",
          "url": "https://bugzilla.suse.com/1091815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-5333"
    },
    {
      "cve": "CVE-2018-8043",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-8043"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-8043",
          "url": "https://www.suse.com/security/cve/CVE-2018-8043"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1084829 for CVE-2018-8043",
          "url": "https://bugzilla.suse.com/1084829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2018-8043"
    },
    {
      "cve": "CVE-2018-8087",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-8087"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-8087",
          "url": "https://www.suse.com/security/cve/CVE-2018-8087"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1085053 for CVE-2018-8087",
          "url": "https://bugzilla.suse.com/1085053"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-8087"
    },
    {
      "cve": "CVE-2018-8822",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-8822"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-8822",
          "url": "https://www.suse.com/security/cve/CVE-2018-8822"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1086162 for CVE-2018-8822",
          "url": "https://bugzilla.suse.com/1086162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1090404 for CVE-2018-8822",
          "url": "https://bugzilla.suse.com/1090404"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1091815 for CVE-2018-8822",
          "url": "https://bugzilla.suse.com/1091815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-8822"
    },
    {
      "cve": "CVE-2019-10207",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-10207"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-10207",
          "url": "https://www.suse.com/security/cve/CVE-2019-10207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1123959 for CVE-2019-10207",
          "url": "https://bugzilla.suse.com/1123959"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1142857 for CVE-2019-10207",
          "url": "https://bugzilla.suse.com/1142857"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-10207"
    },
    {
      "cve": "CVE-2019-11477",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-11477"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-11477",
          "url": "https://www.suse.com/security/cve/CVE-2019-11477"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2019-11477",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1137586 for CVE-2019-11477",
          "url": "https://bugzilla.suse.com/1137586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1142129 for CVE-2019-11477",
          "url": "https://bugzilla.suse.com/1142129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1153242 for CVE-2019-11477",
          "url": "https://bugzilla.suse.com/1153242"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-11477"
    },
    {
      "cve": "CVE-2019-11478",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-11478"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-11478",
          "url": "https://www.suse.com/security/cve/CVE-2019-11478"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2019-11478",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1137586 for CVE-2019-11478",
          "url": "https://bugzilla.suse.com/1137586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1142129 for CVE-2019-11478",
          "url": "https://bugzilla.suse.com/1142129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1143542 for CVE-2019-11478",
          "url": "https://bugzilla.suse.com/1143542"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-11478"
    },
    {
      "cve": "CVE-2019-11479",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-11479"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-11479",
          "url": "https://www.suse.com/security/cve/CVE-2019-11479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132686 for CVE-2019-11479",
          "url": "https://bugzilla.suse.com/1132686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1137586 for CVE-2019-11479",
          "url": "https://bugzilla.suse.com/1137586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1142129 for CVE-2019-11479",
          "url": "https://bugzilla.suse.com/1142129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1143542 for CVE-2019-11479",
          "url": "https://bugzilla.suse.com/1143542"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-11479"
    },
    {
      "cve": "CVE-2019-14615",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14615"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14615",
          "url": "https://www.suse.com/security/cve/CVE-2019-14615"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160195 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1160195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165881 for CVE-2019-14615",
          "url": "https://bugzilla.suse.com/1165881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14615"
    },
    {
      "cve": "CVE-2019-14814",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14814"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14814",
          "url": "https://www.suse.com/security/cve/CVE-2019-14814"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146512 for CVE-2019-14814",
          "url": "https://bugzilla.suse.com/1146512"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173664 for CVE-2019-14814",
          "url": "https://bugzilla.suse.com/1173664"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1173665 for CVE-2019-14814",
          "url": "https://bugzilla.suse.com/1173665"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-14814"
    },
    {
      "cve": "CVE-2019-14896",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14896"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14896",
          "url": "https://www.suse.com/security/cve/CVE-2019-14896"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157157 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1157157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1160468 for CVE-2019-14896",
          "url": "https://bugzilla.suse.com/1160468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14896"
    },
    {
      "cve": "CVE-2019-15030",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15030"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15030",
          "url": "https://www.suse.com/security/cve/CVE-2019-15030"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149713 for CVE-2019-15030",
          "url": "https://bugzilla.suse.com/1149713"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15030"
    },
    {
      "cve": "CVE-2019-15031",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15031"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15031",
          "url": "https://www.suse.com/security/cve/CVE-2019-15031"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149713 for CVE-2019-15031",
          "url": "https://bugzilla.suse.com/1149713"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15031"
    },
    {
      "cve": "CVE-2019-15098",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15098"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15098",
          "url": "https://www.suse.com/security/cve/CVE-2019-15098"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146378 for CVE-2019-15098",
          "url": "https://bugzilla.suse.com/1146378"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146543 for CVE-2019-15098",
          "url": "https://bugzilla.suse.com/1146543"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15098"
    },
    {
      "cve": "CVE-2019-15099",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15099"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15099",
          "url": "https://www.suse.com/security/cve/CVE-2019-15099"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146368 for CVE-2019-15099",
          "url": "https://bugzilla.suse.com/1146368"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15099"
    },
    {
      "cve": "CVE-2019-15290",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15290"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15290",
          "url": "https://www.suse.com/security/cve/CVE-2019-15290"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146378 for CVE-2019-15290",
          "url": "https://bugzilla.suse.com/1146378"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146519 for CVE-2019-15290",
          "url": "https://bugzilla.suse.com/1146519"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146543 for CVE-2019-15290",
          "url": "https://bugzilla.suse.com/1146543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158381 for CVE-2019-15290",
          "url": "https://bugzilla.suse.com/1158381"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158834 for CVE-2019-15290",
          "url": "https://bugzilla.suse.com/1158834"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15290"
    },
    {
      "cve": "CVE-2019-15504",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15504"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15504",
          "url": "https://www.suse.com/security/cve/CVE-2019-15504"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1147116 for CVE-2019-15504",
          "url": "https://bugzilla.suse.com/1147116"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185852 for CVE-2019-15504",
          "url": "https://bugzilla.suse.com/1185852"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-15504"
    },
    {
      "cve": "CVE-2019-15902",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15902"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15902",
          "url": "https://www.suse.com/security/cve/CVE-2019-15902"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149376 for CVE-2019-15902",
          "url": "https://bugzilla.suse.com/1149376"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1155131 for CVE-2019-15902",
          "url": "https://bugzilla.suse.com/1155131"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15902"
    },
    {
      "cve": "CVE-2019-16231",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16231"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16231",
          "url": "https://www.suse.com/security/cve/CVE-2019-16231"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1150466 for CVE-2019-16231",
          "url": "https://bugzilla.suse.com/1150466"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16231"
    },
    {
      "cve": "CVE-2019-16232",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16232"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16232",
          "url": "https://www.suse.com/security/cve/CVE-2019-16232"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1150465 for CVE-2019-16232",
          "url": "https://bugzilla.suse.com/1150465"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-16232"
    },
    {
      "cve": "CVE-2019-16234",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-16234"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-16234",
          "url": "https://www.suse.com/security/cve/CVE-2019-16234"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1150452 for CVE-2019-16234",
          "url": "https://bugzilla.suse.com/1150452"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-16234"
    },
    {
      "cve": "CVE-2019-17133",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17133"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17133",
          "url": "https://www.suse.com/security/cve/CVE-2019-17133"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1153158 for CVE-2019-17133",
          "url": "https://bugzilla.suse.com/1153158"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1153161 for CVE-2019-17133",
          "url": "https://bugzilla.suse.com/1153161"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-17133"
    },
    {
      "cve": "CVE-2019-17666",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17666"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17666",
          "url": "https://www.suse.com/security/cve/CVE-2019-17666"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1154372 for CVE-2019-17666",
          "url": "https://bugzilla.suse.com/1154372"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-17666"
    },
    {
      "cve": "CVE-2019-18808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18808",
          "url": "https://www.suse.com/security/cve/CVE-2019-18808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156259 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1156259"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2019-18808",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18808"
    },
    {
      "cve": "CVE-2019-18812",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18812"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18812",
          "url": "https://www.suse.com/security/cve/CVE-2019-18812"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156277 for CVE-2019-18812",
          "url": "https://bugzilla.suse.com/1156277"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18812"
    },
    {
      "cve": "CVE-2019-18813",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-18813"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-18813",
          "url": "https://www.suse.com/security/cve/CVE-2019-18813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156278 for CVE-2019-18813",
          "url": "https://bugzilla.suse.com/1156278"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-18813"
    },
    {
      "cve": "CVE-2019-19252",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19252"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19252",
          "url": "https://www.suse.com/security/cve/CVE-2019-19252"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1157813 for CVE-2019-19252",
          "url": "https://bugzilla.suse.com/1157813"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19252"
    },
    {
      "cve": "CVE-2019-19332",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19332"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19332",
          "url": "https://www.suse.com/security/cve/CVE-2019-19332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158827 for CVE-2019-19332",
          "url": "https://bugzilla.suse.com/1158827"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19332"
    },
    {
      "cve": "CVE-2019-19338",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19338"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19338",
          "url": "https://www.suse.com/security/cve/CVE-2019-19338"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1158954 for CVE-2019-19338",
          "url": "https://bugzilla.suse.com/1158954"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19338"
    },
    {
      "cve": "CVE-2019-3016",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3016"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3016",
          "url": "https://www.suse.com/security/cve/CVE-2019-3016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2019-3016",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1161154 for CVE-2019-3016",
          "url": "https://bugzilla.suse.com/1161154"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3016"
    },
    {
      "cve": "CVE-2019-3846",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3846"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3846",
          "url": "https://www.suse.com/security/cve/CVE-2019-3846"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136424 for CVE-2019-3846",
          "url": "https://bugzilla.suse.com/1136424"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136446 for CVE-2019-3846",
          "url": "https://bugzilla.suse.com/1136446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156330 for CVE-2019-3846",
          "url": "https://bugzilla.suse.com/1156330"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3846"
    },
    {
      "cve": "CVE-2019-3882",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3882"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3882",
          "url": "https://www.suse.com/security/cve/CVE-2019-3882"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1131416 for CVE-2019-3882",
          "url": "https://bugzilla.suse.com/1131416"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1131427 for CVE-2019-3882",
          "url": "https://bugzilla.suse.com/1131427"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133319 for CVE-2019-3882",
          "url": "https://bugzilla.suse.com/1133319"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3882"
    },
    {
      "cve": "CVE-2019-3887",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-3887"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-3887",
          "url": "https://www.suse.com/security/cve/CVE-2019-3887"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1131800 for CVE-2019-3887",
          "url": "https://bugzilla.suse.com/1131800"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-3887"
    },
    {
      "cve": "CVE-2019-6974",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-6974"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-6974",
          "url": "https://www.suse.com/security/cve/CVE-2019-6974"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1124728 for CVE-2019-6974",
          "url": "https://bugzilla.suse.com/1124728"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1124729 for CVE-2019-6974",
          "url": "https://bugzilla.suse.com/1124729"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-6974"
    },
    {
      "cve": "CVE-2019-7221",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-7221"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-7221",
          "url": "https://www.suse.com/security/cve/CVE-2019-7221"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1124732 for CVE-2019-7221",
          "url": "https://bugzilla.suse.com/1124732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1124734 for CVE-2019-7221",
          "url": "https://bugzilla.suse.com/1124734"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-7221"
    },
    {
      "cve": "CVE-2019-7222",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-7222"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-7222",
          "url": "https://www.suse.com/security/cve/CVE-2019-7222"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1124735 for CVE-2019-7222",
          "url": "https://bugzilla.suse.com/1124735"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-7222"
    },
    {
      "cve": "CVE-2019-8564",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-8564"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-8564",
          "url": "https://www.suse.com/security/cve/CVE-2019-8564"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132673 for CVE-2019-8564",
          "url": "https://bugzilla.suse.com/1132673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132828 for CVE-2019-8564",
          "url": "https://bugzilla.suse.com/1132828"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-8564"
    },
    {
      "cve": "CVE-2019-8912",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-8912"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-8912",
          "url": "https://www.suse.com/security/cve/CVE-2019-8912"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1125907 for CVE-2019-8912",
          "url": "https://bugzilla.suse.com/1125907"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1126284 for CVE-2019-8912",
          "url": "https://bugzilla.suse.com/1126284"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-8912"
    },
    {
      "cve": "CVE-2019-9500",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-9500"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-9500",
          "url": "https://www.suse.com/security/cve/CVE-2019-9500"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1132681 for CVE-2019-9500",
          "url": "https://bugzilla.suse.com/1132681"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-9500"
    },
    {
      "cve": "CVE-2020-10135",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10135"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10135",
          "url": "https://www.suse.com/security/cve/CVE-2020-10135"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171988 for CVE-2020-10135",
          "url": "https://bugzilla.suse.com/1171988"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10135"
    },
    {
      "cve": "CVE-2020-10766",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10766"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10766",
          "url": "https://www.suse.com/security/cve/CVE-2020-10766"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-10766",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172781 for CVE-2020-10766",
          "url": "https://bugzilla.suse.com/1172781"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10766"
    },
    {
      "cve": "CVE-2020-10767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10767",
          "url": "https://www.suse.com/security/cve/CVE-2020-10767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-10767",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172782 for CVE-2020-10767",
          "url": "https://bugzilla.suse.com/1172782"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10767"
    },
    {
      "cve": "CVE-2020-10768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10768",
          "url": "https://www.suse.com/security/cve/CVE-2020-10768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159281 for CVE-2020-10768",
          "url": "https://bugzilla.suse.com/1159281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172783 for CVE-2020-10768",
          "url": "https://bugzilla.suse.com/1172783"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10768"
    },
    {
      "cve": "CVE-2020-12351",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12351"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12351",
          "url": "https://www.suse.com/security/cve/CVE-2020-12351"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177724 for CVE-2020-12351",
          "url": "https://bugzilla.suse.com/1177724"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177729 for CVE-2020-12351",
          "url": "https://bugzilla.suse.com/1177729"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178397 for CVE-2020-12351",
          "url": "https://bugzilla.suse.com/1178397"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-12351"
    },
    {
      "cve": "CVE-2020-12352",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12352"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12352",
          "url": "https://www.suse.com/security/cve/CVE-2020-12352"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177725 for CVE-2020-12352",
          "url": "https://bugzilla.suse.com/1177725"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178398 for CVE-2020-12352",
          "url": "https://bugzilla.suse.com/1178398"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12352"
    },
    {
      "cve": "CVE-2020-14331",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14331"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14331",
          "url": "https://www.suse.com/security/cve/CVE-2020-14331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174205 for CVE-2020-14331",
          "url": "https://bugzilla.suse.com/1174205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1174247 for CVE-2020-14331",
          "url": "https://bugzilla.suse.com/1174247"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-14331"
    },
    {
      "cve": "CVE-2020-14386",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-14386"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-14386",
          "url": "https://www.suse.com/security/cve/CVE-2020-14386"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176069 for CVE-2020-14386",
          "url": "https://bugzilla.suse.com/1176069"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176072 for CVE-2020-14386",
          "url": "https://bugzilla.suse.com/1176072"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-14386"
    },
    {
      "cve": "CVE-2020-24586",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-24586"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-24586",
          "url": "https://www.suse.com/security/cve/CVE-2020-24586"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185859 for CVE-2020-24586",
          "url": "https://bugzilla.suse.com/1185859"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192868 for CVE-2020-24586",
          "url": "https://bugzilla.suse.com/1192868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-24586"
    },
    {
      "cve": "CVE-2020-24587",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-24587"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-24587",
          "url": "https://www.suse.com/security/cve/CVE-2020-24587"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185859 for CVE-2020-24587",
          "url": "https://bugzilla.suse.com/1185859"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185862 for CVE-2020-24587",
          "url": "https://bugzilla.suse.com/1185862"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192868 for CVE-2020-24587",
          "url": "https://bugzilla.suse.com/1192868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-24587"
    },
    {
      "cve": "CVE-2020-24588",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-24588"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-24588",
          "url": "https://www.suse.com/security/cve/CVE-2020-24588"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185861 for CVE-2020-24588",
          "url": "https://bugzilla.suse.com/1185861"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192868 for CVE-2020-24588",
          "url": "https://bugzilla.suse.com/1192868"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199701 for CVE-2020-24588",
          "url": "https://bugzilla.suse.com/1199701"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-24588"
    },
    {
      "cve": "CVE-2020-25639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25639",
          "url": "https://www.suse.com/security/cve/CVE-2020-25639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176846 for CVE-2020-25639",
          "url": "https://bugzilla.suse.com/1176846"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25639"
    },
    {
      "cve": "CVE-2020-25656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25656",
          "url": "https://www.suse.com/security/cve/CVE-2020-25656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177766 for CVE-2020-25656",
          "url": "https://bugzilla.suse.com/1177766"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-25656"
    },
    {
      "cve": "CVE-2020-25668",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-25668"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-25668",
          "url": "https://www.suse.com/security/cve/CVE-2020-25668"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178123 for CVE-2020-25668",
          "url": "https://bugzilla.suse.com/1178123"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178622 for CVE-2020-25668",
          "url": "https://bugzilla.suse.com/1178622"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2020-25668",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-25668"
    },
    {
      "cve": "CVE-2020-26141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-26141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-26141",
          "url": "https://www.suse.com/security/cve/CVE-2020-26141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185987 for CVE-2020-26141",
          "url": "https://bugzilla.suse.com/1185987"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-26141"
    },
    {
      "cve": "CVE-2020-2732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-2732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-2732",
          "url": "https://www.suse.com/security/cve/CVE-2020-2732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1163971 for CVE-2020-2732",
          "url": "https://bugzilla.suse.com/1163971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-2732"
    },
    {
      "cve": "CVE-2020-29660",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29660"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29660",
          "url": "https://www.suse.com/security/cve/CVE-2020-29660"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179745 for CVE-2020-29660",
          "url": "https://bugzilla.suse.com/1179745"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179877 for CVE-2020-29660",
          "url": "https://bugzilla.suse.com/1179877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-29660"
    },
    {
      "cve": "CVE-2020-29661",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-29661"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-29661",
          "url": "https://www.suse.com/security/cve/CVE-2020-29661"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179745 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1179745"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179877 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1179877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214268 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1214268"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218966 for CVE-2020-29661",
          "url": "https://bugzilla.suse.com/1218966"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-29661"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8694",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8694"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8694",
          "url": "https://www.suse.com/security/cve/CVE-2020-8694"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170415 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1170415"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1170446 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1170446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178591 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1178591"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178700 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1178700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1179661 for CVE-2020-8694",
          "url": "https://bugzilla.suse.com/1179661"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8694"
    },
    {
      "cve": "CVE-2021-23133",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-23133"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-23133",
          "url": "https://www.suse.com/security/cve/CVE-2021-23133"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184675 for CVE-2021-23133",
          "url": "https://bugzilla.suse.com/1184675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185901 for CVE-2021-23133",
          "url": "https://bugzilla.suse.com/1185901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-23133"
    },
    {
      "cve": "CVE-2021-26708",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-26708"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-26708",
          "url": "https://www.suse.com/security/cve/CVE-2021-26708"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1181806 for CVE-2021-26708",
          "url": "https://bugzilla.suse.com/1181806"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1183298 for CVE-2021-26708",
          "url": "https://bugzilla.suse.com/1183298"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-26708"
    },
    {
      "cve": "CVE-2021-28971",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-28971"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-28971",
          "url": "https://www.suse.com/security/cve/CVE-2021-28971"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184196 for CVE-2021-28971",
          "url": "https://bugzilla.suse.com/1184196"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-28971"
    },
    {
      "cve": "CVE-2021-32606",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-32606"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-32606",
          "url": "https://www.suse.com/security/cve/CVE-2021-32606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185953 for CVE-2021-32606",
          "url": "https://bugzilla.suse.com/1185953"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-32606"
    },
    {
      "cve": "CVE-2021-33909",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-33909"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-33909",
          "url": "https://www.suse.com/security/cve/CVE-2021-33909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188062 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188063 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188063"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188257 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1188257"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189302 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1189302"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190859 for CVE-2021-33909",
          "url": "https://bugzilla.suse.com/1190859"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-3483",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3483"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3483",
          "url": "https://www.suse.com/security/cve/CVE-2021-3483"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184393 for CVE-2021-3483",
          "url": "https://bugzilla.suse.com/1184393"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3483"
    },
    {
      "cve": "CVE-2021-3489",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3489"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3489",
          "url": "https://www.suse.com/security/cve/CVE-2021-3489"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185640 for CVE-2021-3489",
          "url": "https://bugzilla.suse.com/1185640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185856 for CVE-2021-3489",
          "url": "https://bugzilla.suse.com/1185856"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3489"
    },
    {
      "cve": "CVE-2021-3490",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3490"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3490",
          "url": "https://www.suse.com/security/cve/CVE-2021-3490"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185641 for CVE-2021-3490",
          "url": "https://bugzilla.suse.com/1185641"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185796 for CVE-2021-3490",
          "url": "https://bugzilla.suse.com/1185796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3490"
    },
    {
      "cve": "CVE-2021-3491",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3491"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3491",
          "url": "https://www.suse.com/security/cve/CVE-2021-3491"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1185642 for CVE-2021-3491",
          "url": "https://bugzilla.suse.com/1185642"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187090 for CVE-2021-3491",
          "url": "https://bugzilla.suse.com/1187090"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3491"
    },
    {
      "cve": "CVE-2021-3542",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3542"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3542",
          "url": "https://www.suse.com/security/cve/CVE-2021-3542"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1184673 for CVE-2021-3542",
          "url": "https://bugzilla.suse.com/1184673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1186063 for CVE-2021-3542",
          "url": "https://bugzilla.suse.com/1186063"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3542"
    },
    {
      "cve": "CVE-2021-3640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3640",
          "url": "https://www.suse.com/security/cve/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188172 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188172"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188613 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191530 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1191530"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3640"
    },
    {
      "cve": "CVE-2021-3653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3653",
          "url": "https://www.suse.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189399 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189399"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189420 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189420"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3653"
    },
    {
      "cve": "CVE-2021-3656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3656",
          "url": "https://www.suse.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189400 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189400"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189418 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189418"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3656"
    },
    {
      "cve": "CVE-2021-3744",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3744"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3744",
          "url": "https://www.suse.com/security/cve/CVE-2021-3744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189884 for CVE-2021-3744",
          "url": "https://bugzilla.suse.com/1189884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190534 for CVE-2021-3744",
          "url": "https://bugzilla.suse.com/1190534"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3744"
    },
    {
      "cve": "CVE-2021-3753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3753",
          "url": "https://www.suse.com/security/cve/CVE-2021-3753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190025 for CVE-2021-3753",
          "url": "https://bugzilla.suse.com/1190025"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3753"
    },
    {
      "cve": "CVE-2021-37576",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-37576"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-37576",
          "url": "https://www.suse.com/security/cve/CVE-2021-37576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188838 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188838"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188842 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1188842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190276 for CVE-2021-37576",
          "url": "https://bugzilla.suse.com/1190276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-37576"
    },
    {
      "cve": "CVE-2021-3759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3759",
          "url": "https://www.suse.com/security/cve/CVE-2021-3759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190115 for CVE-2021-3759",
          "url": "https://bugzilla.suse.com/1190115"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3759"
    },
    {
      "cve": "CVE-2021-38166",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38166"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38166",
          "url": "https://www.suse.com/security/cve/CVE-2021-38166"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189233 for CVE-2021-38166",
          "url": "https://bugzilla.suse.com/1189233"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38166"
    },
    {
      "cve": "CVE-2021-43976",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-43976"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-43976",
          "url": "https://www.suse.com/security/cve/CVE-2021-43976"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1192847 for CVE-2021-43976",
          "url": "https://bugzilla.suse.com/1192847"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-43976"
    },
    {
      "cve": "CVE-2022-0185",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0185"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0185",
          "url": "https://www.suse.com/security/cve/CVE-2022-0185"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194517 for CVE-2022-0185",
          "url": "https://bugzilla.suse.com/1194517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194737 for CVE-2022-0185",
          "url": "https://bugzilla.suse.com/1194737"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0185"
    },
    {
      "cve": "CVE-2022-0330",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0330"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0330",
          "url": "https://www.suse.com/security/cve/CVE-2022-0330"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194880 for CVE-2022-0330",
          "url": "https://bugzilla.suse.com/1194880"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195950 for CVE-2022-0330",
          "url": "https://bugzilla.suse.com/1195950"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0330"
    },
    {
      "cve": "CVE-2022-0847",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0847"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0847",
          "url": "https://www.suse.com/security/cve/CVE-2022-0847"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196584 for CVE-2022-0847",
          "url": "https://bugzilla.suse.com/1196584"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196601 for CVE-2022-0847",
          "url": "https://bugzilla.suse.com/1196601"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0847"
    },
    {
      "cve": "CVE-2022-0886",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0886"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27666. Reason: This candidate is a reservation duplicate of CVE-2022-27666. Notes: All CVE users should reference CVE-2022-27666 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0886",
          "url": "https://www.suse.com/security/cve/CVE-2022-0886"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197131 for CVE-2022-0886",
          "url": "https://bugzilla.suse.com/1197131"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197133 for CVE-2022-0886",
          "url": "https://bugzilla.suse.com/1197133"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197462 for CVE-2022-0886",
          "url": "https://bugzilla.suse.com/1197462"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0886"
    },
    {
      "cve": "CVE-2022-1462",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1462"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1462",
          "url": "https://www.suse.com/security/cve/CVE-2022-1462"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198829 for CVE-2022-1462",
          "url": "https://bugzilla.suse.com/1198829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1462"
    },
    {
      "cve": "CVE-2022-1516",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1516"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1516",
          "url": "https://www.suse.com/security/cve/CVE-2022-1516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199012 for CVE-2022-1516",
          "url": "https://bugzilla.suse.com/1199012"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1516"
    },
    {
      "cve": "CVE-2022-1679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1679",
          "url": "https://www.suse.com/security/cve/CVE-2022-1679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199487 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1199487"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201080 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1201080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201832 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1201832"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204132 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1204132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212316 for CVE-2022-1679",
          "url": "https://bugzilla.suse.com/1212316"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-1679"
    },
    {
      "cve": "CVE-2022-1729",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1729"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1729",
          "url": "https://www.suse.com/security/cve/CVE-2022-1729"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199507 for CVE-2022-1729",
          "url": "https://bugzilla.suse.com/1199507"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199697 for CVE-2022-1729",
          "url": "https://bugzilla.suse.com/1199697"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201832 for CVE-2022-1729",
          "url": "https://bugzilla.suse.com/1201832"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-1729"
    },
    {
      "cve": "CVE-2022-1852",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1852"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1852",
          "url": "https://www.suse.com/security/cve/CVE-2022-1852"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199875 for CVE-2022-1852",
          "url": "https://bugzilla.suse.com/1199875"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1852"
    },
    {
      "cve": "CVE-2022-1966",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1966"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1966",
          "url": "https://www.suse.com/security/cve/CVE-2022-1966"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200015 for CVE-2022-1966",
          "url": "https://bugzilla.suse.com/1200015"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200268 for CVE-2022-1966",
          "url": "https://bugzilla.suse.com/1200268"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200494 for CVE-2022-1966",
          "url": "https://bugzilla.suse.com/1200494"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200529 for CVE-2022-1966",
          "url": "https://bugzilla.suse.com/1200529"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-1966"
    },
    {
      "cve": "CVE-2022-1972",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1972"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1972",
          "url": "https://www.suse.com/security/cve/CVE-2022-1972"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200019 for CVE-2022-1972",
          "url": "https://bugzilla.suse.com/1200019"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200266 for CVE-2022-1972",
          "url": "https://bugzilla.suse.com/1200266"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-1972"
    },
    {
      "cve": "CVE-2022-1973",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1973"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1973",
          "url": "https://www.suse.com/security/cve/CVE-2022-1973"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200023 for CVE-2022-1973",
          "url": "https://bugzilla.suse.com/1200023"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-1973"
    },
    {
      "cve": "CVE-2022-22942",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-22942"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-22942",
          "url": "https://www.suse.com/security/cve/CVE-2022-22942"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195065 for CVE-2022-22942",
          "url": "https://bugzilla.suse.com/1195065"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195951 for CVE-2022-22942",
          "url": "https://bugzilla.suse.com/1195951"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-22942"
    },
    {
      "cve": "CVE-2022-2308",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2308"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2308",
          "url": "https://www.suse.com/security/cve/CVE-2022-2308"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202573 for CVE-2022-2308",
          "url": "https://bugzilla.suse.com/1202573"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2308"
    },
    {
      "cve": "CVE-2022-24958",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-24958"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-24958",
          "url": "https://www.suse.com/security/cve/CVE-2022-24958"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195905 for CVE-2022-24958",
          "url": "https://bugzilla.suse.com/1195905"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-24958"
    },
    {
      "cve": "CVE-2022-2588",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2588"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2588",
          "url": "https://www.suse.com/security/cve/CVE-2022-2588"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202096 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1202096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203613 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1203613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204183 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1204183"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-2588",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2588"
    },
    {
      "cve": "CVE-2022-2590",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2590"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2590",
          "url": "https://www.suse.com/security/cve/CVE-2022-2590"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202013 for CVE-2022-2590",
          "url": "https://bugzilla.suse.com/1202013"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202089 for CVE-2022-2590",
          "url": "https://bugzilla.suse.com/1202089"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-2590"
    },
    {
      "cve": "CVE-2022-26490",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-26490"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-26490",
          "url": "https://www.suse.com/security/cve/CVE-2022-26490"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196830 for CVE-2022-26490",
          "url": "https://bugzilla.suse.com/1196830"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201656 for CVE-2022-26490",
          "url": "https://bugzilla.suse.com/1201656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201969 for CVE-2022-26490",
          "url": "https://bugzilla.suse.com/1201969"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211495 for CVE-2022-26490",
          "url": "https://bugzilla.suse.com/1211495"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-26490"
    },
    {
      "cve": "CVE-2022-28388",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28388"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28388",
          "url": "https://www.suse.com/security/cve/CVE-2022-28388"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198032 for CVE-2022-28388",
          "url": "https://bugzilla.suse.com/1198032"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-28388"
    },
    {
      "cve": "CVE-2022-28389",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28389"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28389",
          "url": "https://www.suse.com/security/cve/CVE-2022-28389"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198033 for CVE-2022-28389",
          "url": "https://bugzilla.suse.com/1198033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201657 for CVE-2022-28389",
          "url": "https://bugzilla.suse.com/1201657"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-28389"
    },
    {
      "cve": "CVE-2022-28390",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28390"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28390",
          "url": "https://www.suse.com/security/cve/CVE-2022-28390"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198031 for CVE-2022-28390",
          "url": "https://bugzilla.suse.com/1198031"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201517 for CVE-2022-28390",
          "url": "https://bugzilla.suse.com/1201517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1207969 for CVE-2022-28390",
          "url": "https://bugzilla.suse.com/1207969"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-28390"
    },
    {
      "cve": "CVE-2022-28893",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-28893"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-28893",
          "url": "https://www.suse.com/security/cve/CVE-2022-28893"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198330 for CVE-2022-28893",
          "url": "https://bugzilla.suse.com/1198330"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-28893"
    },
    {
      "cve": "CVE-2022-29900",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-29900"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-29900",
          "url": "https://www.suse.com/security/cve/CVE-2022-29900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199657 for CVE-2022-29900",
          "url": "https://bugzilla.suse.com/1199657"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201469 for CVE-2022-29900",
          "url": "https://bugzilla.suse.com/1201469"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1207894 for CVE-2022-29900",
          "url": "https://bugzilla.suse.com/1207894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-29900"
    },
    {
      "cve": "CVE-2022-29901",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-29901"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-29901",
          "url": "https://www.suse.com/security/cve/CVE-2022-29901"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199657 for CVE-2022-29901",
          "url": "https://bugzilla.suse.com/1199657"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201469 for CVE-2022-29901",
          "url": "https://bugzilla.suse.com/1201469"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1207894 for CVE-2022-29901",
          "url": "https://bugzilla.suse.com/1207894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-29901"
    },
    {
      "cve": "CVE-2022-29968",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-29968"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-29968",
          "url": "https://www.suse.com/security/cve/CVE-2022-29968"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1199087 for CVE-2022-29968",
          "url": "https://bugzilla.suse.com/1199087"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-29968"
    },
    {
      "cve": "CVE-2022-3424",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3424"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3424",
          "url": "https://www.suse.com/security/cve/CVE-2022-3424"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204166 for CVE-2022-3424",
          "url": "https://bugzilla.suse.com/1204166"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204167 for CVE-2022-3424",
          "url": "https://bugzilla.suse.com/1204167"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208044 for CVE-2022-3424",
          "url": "https://bugzilla.suse.com/1208044"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212309 for CVE-2022-3424",
          "url": "https://bugzilla.suse.com/1212309"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-3424"
    },
    {
      "cve": "CVE-2022-34918",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-34918"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-34918",
          "url": "https://www.suse.com/security/cve/CVE-2022-34918"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201171 for CVE-2022-34918",
          "url": "https://bugzilla.suse.com/1201171"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201177 for CVE-2022-34918",
          "url": "https://bugzilla.suse.com/1201177"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201222 for CVE-2022-34918",
          "url": "https://bugzilla.suse.com/1201222"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-34918"
    },
    {
      "cve": "CVE-2022-3628",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3628"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3628",
          "url": "https://www.suse.com/security/cve/CVE-2022-3628"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204868 for CVE-2022-3628",
          "url": "https://bugzilla.suse.com/1204868"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3628"
    },
    {
      "cve": "CVE-2022-3640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3640",
          "url": "https://www.suse.com/security/cve/CVE-2022-3640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204619 for CVE-2022-3640",
          "url": "https://bugzilla.suse.com/1204619"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204624 for CVE-2022-3640",
          "url": "https://bugzilla.suse.com/1204624"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-3640",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-3640"
    },
    {
      "cve": "CVE-2022-40982",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-40982"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-40982",
          "url": "https://www.suse.com/security/cve/CVE-2022-40982"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206418 for CVE-2022-40982",
          "url": "https://bugzilla.suse.com/1206418"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215674 for CVE-2022-40982",
          "url": "https://bugzilla.suse.com/1215674"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-40982"
    },
    {
      "cve": "CVE-2022-41218",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41218"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41218",
          "url": "https://www.suse.com/security/cve/CVE-2022-41218"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202960 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1202960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203606 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1203606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205313 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1205313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-41218",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-41218"
    },
    {
      "cve": "CVE-2022-41674",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-41674"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-41674",
          "url": "https://www.suse.com/security/cve/CVE-2022-41674"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203770 for CVE-2022-41674",
          "url": "https://bugzilla.suse.com/1203770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203994 for CVE-2022-41674",
          "url": "https://bugzilla.suse.com/1203994"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-41674",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-41674"
    },
    {
      "cve": "CVE-2022-42719",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42719"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42719",
          "url": "https://www.suse.com/security/cve/CVE-2022-42719"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204051 for CVE-2022-42719",
          "url": "https://bugzilla.suse.com/1204051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204292 for CVE-2022-42719",
          "url": "https://bugzilla.suse.com/1204292"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42719",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42719"
    },
    {
      "cve": "CVE-2022-42720",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42720"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42720",
          "url": "https://www.suse.com/security/cve/CVE-2022-42720"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204059 for CVE-2022-42720",
          "url": "https://bugzilla.suse.com/1204059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204291 for CVE-2022-42720",
          "url": "https://bugzilla.suse.com/1204291"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42720",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42720"
    },
    {
      "cve": "CVE-2022-42721",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42721"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42721",
          "url": "https://www.suse.com/security/cve/CVE-2022-42721"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204060 for CVE-2022-42721",
          "url": "https://bugzilla.suse.com/1204060"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204290 for CVE-2022-42721",
          "url": "https://bugzilla.suse.com/1204290"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42721",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42721"
    },
    {
      "cve": "CVE-2022-42722",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-42722"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-42722",
          "url": "https://www.suse.com/security/cve/CVE-2022-42722"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204125 for CVE-2022-42722",
          "url": "https://bugzilla.suse.com/1204125"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204289 for CVE-2022-42722",
          "url": "https://bugzilla.suse.com/1204289"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209225 for CVE-2022-42722",
          "url": "https://bugzilla.suse.com/1209225"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-42722"
    },
    {
      "cve": "CVE-2022-4379",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-4379"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-4379",
          "url": "https://www.suse.com/security/cve/CVE-2022-4379"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206209 for CVE-2022-4379",
          "url": "https://bugzilla.suse.com/1206209"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1206373 for CVE-2022-4379",
          "url": "https://bugzilla.suse.com/1206373"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-4379"
    },
    {
      "cve": "CVE-2022-44032",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-44032"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-44032",
          "url": "https://www.suse.com/security/cve/CVE-2022-44032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204894 for CVE-2022-44032",
          "url": "https://bugzilla.suse.com/1204894"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212290 for CVE-2022-44032",
          "url": "https://bugzilla.suse.com/1212290"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-44032"
    },
    {
      "cve": "CVE-2022-44033",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-44033"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-44033",
          "url": "https://www.suse.com/security/cve/CVE-2022-44033"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204922 for CVE-2022-44033",
          "url": "https://bugzilla.suse.com/1204922"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212306 for CVE-2022-44033",
          "url": "https://bugzilla.suse.com/1212306"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-44033"
    },
    {
      "cve": "CVE-2022-44034",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-44034"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-44034",
          "url": "https://www.suse.com/security/cve/CVE-2022-44034"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204901 for CVE-2022-44034",
          "url": "https://bugzilla.suse.com/1204901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-44034"
    },
    {
      "cve": "CVE-2022-45884",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-45884"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-45884",
          "url": "https://www.suse.com/security/cve/CVE-2022-45884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205756 for CVE-2022-45884",
          "url": "https://bugzilla.suse.com/1205756"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-45884"
    },
    {
      "cve": "CVE-2022-45885",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-45885"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-45885",
          "url": "https://www.suse.com/security/cve/CVE-2022-45885"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205758 for CVE-2022-45885",
          "url": "https://bugzilla.suse.com/1205758"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-45885"
    },
    {
      "cve": "CVE-2022-45886",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-45886"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-45886",
          "url": "https://www.suse.com/security/cve/CVE-2022-45886"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205760 for CVE-2022-45886",
          "url": "https://bugzilla.suse.com/1205760"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-45886"
    },
    {
      "cve": "CVE-2022-45887",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-45887"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-45887",
          "url": "https://www.suse.com/security/cve/CVE-2022-45887"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205762 for CVE-2022-45887",
          "url": "https://bugzilla.suse.com/1205762"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2022-45887",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-45887"
    },
    {
      "cve": "CVE-2022-45888",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-45888"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-45888",
          "url": "https://www.suse.com/security/cve/CVE-2022-45888"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205764 for CVE-2022-45888",
          "url": "https://bugzilla.suse.com/1205764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-45888"
    },
    {
      "cve": "CVE-2022-45919",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-45919"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-45919",
          "url": "https://www.suse.com/security/cve/CVE-2022-45919"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205803 for CVE-2022-45919",
          "url": "https://bugzilla.suse.com/1205803"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208600 for CVE-2022-45919",
          "url": "https://bugzilla.suse.com/1208600"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208912 for CVE-2022-45919",
          "url": "https://bugzilla.suse.com/1208912"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214128 for CVE-2022-45919",
          "url": "https://bugzilla.suse.com/1214128"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215674 for CVE-2022-45919",
          "url": "https://bugzilla.suse.com/1215674"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-45919"
    },
    {
      "cve": "CVE-2022-45934",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-45934"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-45934",
          "url": "https://www.suse.com/security/cve/CVE-2022-45934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1205796 for CVE-2022-45934",
          "url": "https://bugzilla.suse.com/1205796"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212292 for CVE-2022-45934",
          "url": "https://bugzilla.suse.com/1212292"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-45934"
    },
    {
      "cve": "CVE-2023-0045",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-0045"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set   function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall.   The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit  a664ec9158eeddd75121d39c9a0758016097fa96",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-0045",
          "url": "https://www.suse.com/security/cve/CVE-2023-0045"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1207773 for CVE-2023-0045",
          "url": "https://bugzilla.suse.com/1207773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-0045"
    },
    {
      "cve": "CVE-2023-1076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-1076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-1076",
          "url": "https://www.suse.com/security/cve/CVE-2023-1076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208599 for CVE-2023-1076",
          "url": "https://bugzilla.suse.com/1208599"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214019 for CVE-2023-1076",
          "url": "https://bugzilla.suse.com/1214019"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-1076"
    },
    {
      "cve": "CVE-2023-1078",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-1078"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-1078",
          "url": "https://www.suse.com/security/cve/CVE-2023-1078"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208601 for CVE-2023-1078",
          "url": "https://bugzilla.suse.com/1208601"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208603 for CVE-2023-1078",
          "url": "https://bugzilla.suse.com/1208603"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-1078"
    },
    {
      "cve": "CVE-2023-1192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-1192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-1192",
          "url": "https://www.suse.com/security/cve/CVE-2023-1192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208995 for CVE-2023-1192",
          "url": "https://bugzilla.suse.com/1208995"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-1192"
    },
    {
      "cve": "CVE-2023-1380",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-1380"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-1380",
          "url": "https://www.suse.com/security/cve/CVE-2023-1380"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209287 for CVE-2023-1380",
          "url": "https://bugzilla.suse.com/1209287"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-1380"
    },
    {
      "cve": "CVE-2023-20569",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-20569"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-20569",
          "url": "https://www.suse.com/security/cve/CVE-2023-20569"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213287 for CVE-2023-20569",
          "url": "https://bugzilla.suse.com/1213287"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-20569"
    },
    {
      "cve": "CVE-2023-20593",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-20593"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-20593",
          "url": "https://www.suse.com/security/cve/CVE-2023-20593"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213286 for CVE-2023-20593",
          "url": "https://bugzilla.suse.com/1213286"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213616 for CVE-2023-20593",
          "url": "https://bugzilla.suse.com/1213616"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215674 for CVE-2023-20593",
          "url": "https://bugzilla.suse.com/1215674"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-20593"
    },
    {
      "cve": "CVE-2023-2124",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-2124"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-2124",
          "url": "https://www.suse.com/security/cve/CVE-2023-2124"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210498 for CVE-2023-2124",
          "url": "https://bugzilla.suse.com/1210498"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-2124"
    },
    {
      "cve": "CVE-2023-31084",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-31084"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(\u0026fepriv-\u003esem) is called. However, wait_event_interruptible would put the process to sleep, and down(\u0026fepriv-\u003esem) may block the process.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-31084",
          "url": "https://www.suse.com/security/cve/CVE-2023-31084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210783 for CVE-2023-31084",
          "url": "https://bugzilla.suse.com/1210783"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-31084"
    },
    {
      "cve": "CVE-2023-3141",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-3141"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-3141",
          "url": "https://www.suse.com/security/cve/CVE-2023-3141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212129 for CVE-2023-3141",
          "url": "https://bugzilla.suse.com/1212129"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215674 for CVE-2023-3141",
          "url": "https://bugzilla.suse.com/1215674"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-3141"
    },
    {
      "cve": "CVE-2023-3269",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-3269"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-3269",
          "url": "https://www.suse.com/security/cve/CVE-2023-3269"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212395 for CVE-2023-3269",
          "url": "https://bugzilla.suse.com/1212395"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213760 for CVE-2023-3269",
          "url": "https://bugzilla.suse.com/1213760"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-3269"
    },
    {
      "cve": "CVE-2023-39192",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-39192"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-39192",
          "url": "https://www.suse.com/security/cve/CVE-2023-39192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215858 for CVE-2023-39192",
          "url": "https://bugzilla.suse.com/1215858"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-39192",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-39192"
    },
    {
      "cve": "CVE-2023-39193",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-39193"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-39193",
          "url": "https://www.suse.com/security/cve/CVE-2023-39193"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215860 for CVE-2023-39193",
          "url": "https://bugzilla.suse.com/1215860"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-39193",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-39193"
    },
    {
      "cve": "CVE-2023-4128",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-4128"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208.  Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-4128",
          "url": "https://www.suse.com/security/cve/CVE-2023-4128"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214149 for CVE-2023-4128",
          "url": "https://bugzilla.suse.com/1214149"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-4128"
    },
    {
      "cve": "CVE-2023-4134",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-4134"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-4134",
          "url": "https://www.suse.com/security/cve/CVE-2023-4134"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213971 for CVE-2023-4134",
          "url": "https://bugzilla.suse.com/1213971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-4134"
    },
    {
      "cve": "CVE-2023-4194",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-4194"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode-\u003ei_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-4194",
          "url": "https://www.suse.com/security/cve/CVE-2023-4194"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214019 for CVE-2023-4194",
          "url": "https://bugzilla.suse.com/1214019"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-4194"
    },
    {
      "cve": "CVE-2023-42753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-42753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-42753",
          "url": "https://www.suse.com/security/cve/CVE-2023-42753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215150 for CVE-2023-42753",
          "url": "https://bugzilla.suse.com/1215150"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218613 for CVE-2023-42753",
          "url": "https://bugzilla.suse.com/1218613"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-42753"
    },
    {
      "cve": "CVE-2023-42754",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-42754"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-42754",
          "url": "https://www.suse.com/security/cve/CVE-2023-42754"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215467 for CVE-2023-42754",
          "url": "https://bugzilla.suse.com/1215467"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222212 for CVE-2023-42754",
          "url": "https://bugzilla.suse.com/1222212"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-42754"
    },
    {
      "cve": "CVE-2023-42756",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-42756"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-42756",
          "url": "https://www.suse.com/security/cve/CVE-2023-42756"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215767 for CVE-2023-42756",
          "url": "https://bugzilla.suse.com/1215767"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-42756"
    },
    {
      "cve": "CVE-2023-4623",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-4623"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-4623",
          "url": "https://www.suse.com/security/cve/CVE-2023-4623"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215115 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1215115"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215440 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1215440"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217444 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1217444"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217531 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1217531"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219698 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1219698"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221578 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1221578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221598 for CVE-2023-4623",
          "url": "https://bugzilla.suse.com/1221598"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-4623"
    },
    {
      "cve": "CVE-2023-46813",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-46813"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-46813",
          "url": "https://www.suse.com/security/cve/CVE-2023-46813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212649 for CVE-2023-46813",
          "url": "https://bugzilla.suse.com/1212649"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1216896 for CVE-2023-46813",
          "url": "https://bugzilla.suse.com/1216896"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-46813"
    },
    {
      "cve": "CVE-2023-4881",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-4881"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-4881",
          "url": "https://www.suse.com/security/cve/CVE-2023-4881"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215221 for CVE-2023-4881",
          "url": "https://bugzilla.suse.com/1215221"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-4881"
    },
    {
      "cve": "CVE-2023-5345",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-5345"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx-\u003epassword was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-5345",
          "url": "https://www.suse.com/security/cve/CVE-2023-5345"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215899 for CVE-2023-5345",
          "url": "https://bugzilla.suse.com/1215899"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215971 for CVE-2023-5345",
          "url": "https://bugzilla.suse.com/1215971"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-5345"
    },
    {
      "cve": "CVE-2023-6606",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-6606"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-6606",
          "url": "https://www.suse.com/security/cve/CVE-2023-6606"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217947 for CVE-2023-6606",
          "url": "https://bugzilla.suse.com/1217947"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220015 for CVE-2023-6606",
          "url": "https://bugzilla.suse.com/1220015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-6606"
    },
    {
      "cve": "CVE-2023-6610",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-6610"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-6610",
          "url": "https://www.suse.com/security/cve/CVE-2023-6610"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217946 for CVE-2023-6610",
          "url": "https://bugzilla.suse.com/1217946"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-6610"
    }
  ]
}
  WID-SEC-W-2024-1591
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service  zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-1591 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-1591 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
      },
      {
        "category": "external",
        "summary": "Juniper Patchday July 2024 vom 2024-07-10",
        "url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
      }
    ],
    "source_lang": "en-US",
    "title": "Juniper JUNOS: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-11-11T23:00:00.000+00:00",
      "generator": {
        "date": "2024-11-12T09:31:28.569+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.8"
        }
      },
      "id": "WID-SEC-W-2024-1591",
      "initial_release_date": "2024-07-10T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-07-10T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-11-11T23:00:00.000+00:00",
          "number": "2",
          "summary": "URL Kodierung angepasst"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Juniper JUNOS",
            "product": {
              "name": "Juniper JUNOS",
              "product_id": "T036093",
              "product_identification_helper": {
                "cpe": "cpe:/o:juniper:junos:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2006-20001",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2006-20001"
    },
    {
      "cve": "CVE-2007-5846",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2007-5846"
    },
    {
      "cve": "CVE-2008-6123",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2008-6123"
    },
    {
      "cve": "CVE-2011-1473",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2011-1473"
    },
    {
      "cve": "CVE-2011-5094",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2011-5094"
    },
    {
      "cve": "CVE-2012-6151",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2012-6151"
    },
    {
      "cve": "CVE-2014-10064",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-10064"
    },
    {
      "cve": "CVE-2014-2285",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-2285"
    },
    {
      "cve": "CVE-2014-2310",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-2310"
    },
    {
      "cve": "CVE-2014-3565",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-3565"
    },
    {
      "cve": "CVE-2014-7191",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-7191"
    },
    {
      "cve": "CVE-2014-8882",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-8882"
    },
    {
      "cve": "CVE-2015-5621",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-5621"
    },
    {
      "cve": "CVE-2015-8100",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-8100"
    },
    {
      "cve": "CVE-2015-9262",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-9262"
    },
    {
      "cve": "CVE-2016-1000232",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-1000232"
    },
    {
      "cve": "CVE-2016-10540",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-10540"
    },
    {
      "cve": "CVE-2016-4658",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-4658"
    },
    {
      "cve": "CVE-2017-1000048",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2017-1000048"
    },
    {
      "cve": "CVE-2017-15010",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2017-15010"
    },
    {
      "cve": "CVE-2018-18065",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-18065"
    },
    {
      "cve": "CVE-2018-20834",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-20834"
    },
    {
      "cve": "CVE-2018-3737",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-3737"
    },
    {
      "cve": "CVE-2018-7408",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-7408"
    },
    {
      "cve": "CVE-2019-10081",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10081"
    },
    {
      "cve": "CVE-2019-10082",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10082"
    },
    {
      "cve": "CVE-2019-10092",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10092"
    },
    {
      "cve": "CVE-2019-10097",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10097"
    },
    {
      "cve": "CVE-2019-10098",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10098"
    },
    {
      "cve": "CVE-2019-11719",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11719"
    },
    {
      "cve": "CVE-2019-11727",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11727"
    },
    {
      "cve": "CVE-2019-11756",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11756"
    },
    {
      "cve": "CVE-2019-16775",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16775"
    },
    {
      "cve": "CVE-2019-16776",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16776"
    },
    {
      "cve": "CVE-2019-16777",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16777"
    },
    {
      "cve": "CVE-2019-17006",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17006"
    },
    {
      "cve": "CVE-2019-17023",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17023"
    },
    {
      "cve": "CVE-2019-17567",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17567"
    },
    {
      "cve": "CVE-2019-20149",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-20149"
    },
    {
      "cve": "CVE-2019-20892",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-20892"
    },
    {
      "cve": "CVE-2019-9517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-9517"
    },
    {
      "cve": "CVE-2020-11668",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11668"
    },
    {
      "cve": "CVE-2020-11984",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11984"
    },
    {
      "cve": "CVE-2020-11993",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11993"
    },
    {
      "cve": "CVE-2020-12362",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12362"
    },
    {
      "cve": "CVE-2020-12400",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12400"
    },
    {
      "cve": "CVE-2020-12401",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12401"
    },
    {
      "cve": "CVE-2020-12402",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12402"
    },
    {
      "cve": "CVE-2020-12403",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12403"
    },
    {
      "cve": "CVE-2020-13938",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-13938"
    },
    {
      "cve": "CVE-2020-13950",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-13950"
    },
    {
      "cve": "CVE-2020-14145",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-14145"
    },
    {
      "cve": "CVE-2020-15861",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-15861"
    },
    {
      "cve": "CVE-2020-15862",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-15862"
    },
    {
      "cve": "CVE-2020-1927",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-1927"
    },
    {
      "cve": "CVE-2020-1934",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-1934"
    },
    {
      "cve": "CVE-2020-28469",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-28469"
    },
    {
      "cve": "CVE-2020-28502",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-28502"
    },
    {
      "cve": "CVE-2020-35452",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-35452"
    },
    {
      "cve": "CVE-2020-36049",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-36049"
    },
    {
      "cve": "CVE-2020-6829",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-6829"
    },
    {
      "cve": "CVE-2020-7660",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7660"
    },
    {
      "cve": "CVE-2020-7754",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7754"
    },
    {
      "cve": "CVE-2020-7774",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7774"
    },
    {
      "cve": "CVE-2020-8648",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-9490",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-9490"
    },
    {
      "cve": "CVE-2021-22543",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-2342",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2342"
    },
    {
      "cve": "CVE-2021-23440",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-23440"
    },
    {
      "cve": "CVE-2021-2356",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2356"
    },
    {
      "cve": "CVE-2021-2372",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2372"
    },
    {
      "cve": "CVE-2021-2385",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2385"
    },
    {
      "cve": "CVE-2021-2389",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2389"
    },
    {
      "cve": "CVE-2021-2390",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2390"
    },
    {
      "cve": "CVE-2021-25745",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25745"
    },
    {
      "cve": "CVE-2021-25746",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25746"
    },
    {
      "cve": "CVE-2021-25748",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25748"
    },
    {
      "cve": "CVE-2021-26690",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-26690"
    },
    {
      "cve": "CVE-2021-26691",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-26691"
    },
    {
      "cve": "CVE-2021-27290",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-27290"
    },
    {
      "cve": "CVE-2021-29469",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-29469"
    },
    {
      "cve": "CVE-2021-30641",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-30641"
    },
    {
      "cve": "CVE-2021-31535",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-31535"
    },
    {
      "cve": "CVE-2021-31618",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-31618"
    },
    {
      "cve": "CVE-2021-3177",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3177"
    },
    {
      "cve": "CVE-2021-32803",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-32803"
    },
    {
      "cve": "CVE-2021-32804",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-32804"
    },
    {
      "cve": "CVE-2021-33033",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33033"
    },
    {
      "cve": "CVE-2021-33034",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33034"
    },
    {
      "cve": "CVE-2021-33193",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33193"
    },
    {
      "cve": "CVE-2021-3347",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3347"
    },
    {
      "cve": "CVE-2021-33909",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-34798",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-35604",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-35604"
    },
    {
      "cve": "CVE-2021-35624",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-35624"
    },
    {
      "cve": "CVE-2021-36160",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-36160"
    },
    {
      "cve": "CVE-2021-37701",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37701"
    },
    {
      "cve": "CVE-2021-37712",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37712"
    },
    {
      "cve": "CVE-2021-37713",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37713"
    },
    {
      "cve": "CVE-2021-3803",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3803"
    },
    {
      "cve": "CVE-2021-39275",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-40438"
    },
    {
      "cve": "CVE-2021-41524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-41524"
    },
    {
      "cve": "CVE-2021-41773",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-41773"
    },
    {
      "cve": "CVE-2021-42013",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-42013"
    },
    {
      "cve": "CVE-2021-43527",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-43527"
    },
    {
      "cve": "CVE-2021-44224",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44224"
    },
    {
      "cve": "CVE-2021-44225",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44225"
    },
    {
      "cve": "CVE-2021-44790",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44790"
    },
    {
      "cve": "CVE-2021-44906",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44906"
    },
    {
      "cve": "CVE-2022-21245",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21245"
    },
    {
      "cve": "CVE-2022-21270",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21270"
    },
    {
      "cve": "CVE-2022-21303",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21303"
    },
    {
      "cve": "CVE-2022-21304",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21304"
    },
    {
      "cve": "CVE-2022-21344",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21344"
    },
    {
      "cve": "CVE-2022-21367",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21367"
    },
    {
      "cve": "CVE-2022-21417",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21417"
    },
    {
      "cve": "CVE-2022-21427",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21427"
    },
    {
      "cve": "CVE-2022-21444",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21444"
    },
    {
      "cve": "CVE-2022-21451",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21451"
    },
    {
      "cve": "CVE-2022-21454",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21454"
    },
    {
      "cve": "CVE-2022-21460",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21460"
    },
    {
      "cve": "CVE-2022-21589",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21589"
    },
    {
      "cve": "CVE-2022-21592",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21592"
    },
    {
      "cve": "CVE-2022-21595",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21595"
    },
    {
      "cve": "CVE-2022-21608",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21608"
    },
    {
      "cve": "CVE-2022-21617",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21617"
    },
    {
      "cve": "CVE-2022-22719",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22719"
    },
    {
      "cve": "CVE-2022-22720",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22720"
    },
    {
      "cve": "CVE-2022-22721",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22721"
    },
    {
      "cve": "CVE-2022-22822",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22822"
    },
    {
      "cve": "CVE-2022-22823",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22823"
    },
    {
      "cve": "CVE-2022-22824",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22824"
    },
    {
      "cve": "CVE-2022-23471",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23471"
    },
    {
      "cve": "CVE-2022-23524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23524"
    },
    {
      "cve": "CVE-2022-23525",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23525"
    },
    {
      "cve": "CVE-2022-23526",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23526"
    },
    {
      "cve": "CVE-2022-23852",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23852"
    },
    {
      "cve": "CVE-2022-23943",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23943"
    },
    {
      "cve": "CVE-2022-25147",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25147"
    },
    {
      "cve": "CVE-2022-25235",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25235"
    },
    {
      "cve": "CVE-2022-25236",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25236"
    },
    {
      "cve": "CVE-2022-2526",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-2526"
    },
    {
      "cve": "CVE-2022-25315",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25315"
    },
    {
      "cve": "CVE-2022-26377",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-26377"
    },
    {
      "cve": "CVE-2022-28330",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28330"
    },
    {
      "cve": "CVE-2022-28614",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28614"
    },
    {
      "cve": "CVE-2022-28615",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28615"
    },
    {
      "cve": "CVE-2022-29167",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-29167"
    },
    {
      "cve": "CVE-2022-29404",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-29404"
    },
    {
      "cve": "CVE-2022-30522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-30522"
    },
    {
      "cve": "CVE-2022-30556",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-30556"
    },
    {
      "cve": "CVE-2022-31813",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-31813"
    },
    {
      "cve": "CVE-2022-3517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-3517"
    },
    {
      "cve": "CVE-2022-3564",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-3564"
    },
    {
      "cve": "CVE-2022-36760",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-36760"
    },
    {
      "cve": "CVE-2022-37434",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-37434"
    },
    {
      "cve": "CVE-2022-37436",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-37436"
    },
    {
      "cve": "CVE-2022-40674",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-40674"
    },
    {
      "cve": "CVE-2022-41741",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-41741"
    },
    {
      "cve": "CVE-2022-41742",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-41742"
    },
    {
      "cve": "CVE-2022-4203",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4203"
    },
    {
      "cve": "CVE-2022-4304",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4304"
    },
    {
      "cve": "CVE-2022-4450",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4450"
    },
    {
      "cve": "CVE-2022-46663",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-46663"
    },
    {
      "cve": "CVE-2022-4886",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4886"
    },
    {
      "cve": "CVE-2023-0215",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0215"
    },
    {
      "cve": "CVE-2023-0216",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0216"
    },
    {
      "cve": "CVE-2023-0217",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0217"
    },
    {
      "cve": "CVE-2023-0286",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0286"
    },
    {
      "cve": "CVE-2023-0401",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0401"
    },
    {
      "cve": "CVE-2023-0464",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0464"
    },
    {
      "cve": "CVE-2023-0465",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0465"
    },
    {
      "cve": "CVE-2023-0466",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0466"
    },
    {
      "cve": "CVE-2023-0767",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0767"
    },
    {
      "cve": "CVE-2023-1255",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-1255"
    },
    {
      "cve": "CVE-2023-2002",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2002"
    },
    {
      "cve": "CVE-2023-20593",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-20593"
    },
    {
      "cve": "CVE-2023-21830",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21830"
    },
    {
      "cve": "CVE-2023-21840",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21840"
    },
    {
      "cve": "CVE-2023-21843",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21843"
    },
    {
      "cve": "CVE-2023-21912",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21912"
    },
    {
      "cve": "CVE-2023-21963",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21963"
    },
    {
      "cve": "CVE-2023-21980",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21980"
    },
    {
      "cve": "CVE-2023-22025",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22025"
    },
    {
      "cve": "CVE-2023-22067",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22067"
    },
    {
      "cve": "CVE-2023-22081",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22081"
    },
    {
      "cve": "CVE-2023-22652",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22652"
    },
    {
      "cve": "CVE-2023-24329",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-24329"
    },
    {
      "cve": "CVE-2023-25153",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25153"
    },
    {
      "cve": "CVE-2023-25173",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25173"
    },
    {
      "cve": "CVE-2023-25690",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25690"
    },
    {
      "cve": "CVE-2023-2700",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2700"
    },
    {
      "cve": "CVE-2023-27522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-27522"
    },
    {
      "cve": "CVE-2023-2828",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2828"
    },
    {
      "cve": "CVE-2023-28840",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28840"
    },
    {
      "cve": "CVE-2023-28841",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28841"
    },
    {
      "cve": "CVE-2023-28842",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28842"
    },
    {
      "cve": "CVE-2023-2975",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2975"
    },
    {
      "cve": "CVE-2023-30079",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-30079"
    },
    {
      "cve": "CVE-2023-30630",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-30630"
    },
    {
      "cve": "CVE-2023-3090",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3090"
    },
    {
      "cve": "CVE-2023-32067",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32067"
    },
    {
      "cve": "CVE-2023-32360",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32360"
    },
    {
      "cve": "CVE-2023-32435",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32435"
    },
    {
      "cve": "CVE-2023-32439",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32439"
    },
    {
      "cve": "CVE-2023-32732",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32732"
    },
    {
      "cve": "CVE-2023-3341",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3341"
    },
    {
      "cve": "CVE-2023-3390",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3390"
    },
    {
      "cve": "CVE-2023-33953",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-33953"
    },
    {
      "cve": "CVE-2023-34058",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34058"
    },
    {
      "cve": "CVE-2023-34059",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34059"
    },
    {
      "cve": "CVE-2023-3446",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3446"
    },
    {
      "cve": "CVE-2023-34969",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34969"
    },
    {
      "cve": "CVE-2023-35001",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-35001"
    },
    {
      "cve": "CVE-2023-35788",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-35788"
    },
    {
      "cve": "CVE-2023-3611",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3611"
    },
    {
      "cve": "CVE-2023-37450",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-37450"
    },
    {
      "cve": "CVE-2023-3776",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3776"
    },
    {
      "cve": "CVE-2023-3817",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3817"
    },
    {
      "cve": "CVE-2023-4004",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4004"
    },
    {
      "cve": "CVE-2023-4206",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4206"
    },
    {
      "cve": "CVE-2023-4207",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4207"
    },
    {
      "cve": "CVE-2023-4208",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4208"
    },
    {
      "cve": "CVE-2023-42753",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-42753"
    },
    {
      "cve": "CVE-2023-4785",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4785"
    },
    {
      "cve": "CVE-2023-4807",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4807"
    },
    {
      "cve": "CVE-2023-4863",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4863"
    },
    {
      "cve": "CVE-2023-5043",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5043"
    },
    {
      "cve": "CVE-2023-5129",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5129"
    },
    {
      "cve": "CVE-2023-5363",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2024-20918",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20918"
    },
    {
      "cve": "CVE-2024-20919",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20919"
    },
    {
      "cve": "CVE-2024-20921",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20921"
    },
    {
      "cve": "CVE-2024-20926",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20926"
    },
    {
      "cve": "CVE-2024-20932",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20932"
    },
    {
      "cve": "CVE-2024-20945",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20945"
    },
    {
      "cve": "CVE-2024-20952",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20952"
    },
    {
      "cve": "CVE-2024-39511",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39511"
    },
    {
      "cve": "CVE-2024-39512",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39512"
    },
    {
      "cve": "CVE-2024-39513",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39513"
    },
    {
      "cve": "CVE-2024-39514",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39514"
    },
    {
      "cve": "CVE-2024-39517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39517"
    },
    {
      "cve": "CVE-2024-39518",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39518"
    },
    {
      "cve": "CVE-2024-39519",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39519"
    },
    {
      "cve": "CVE-2024-39520",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39520"
    },
    {
      "cve": "CVE-2024-39521",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39521"
    },
    {
      "cve": "CVE-2024-39522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39522"
    },
    {
      "cve": "CVE-2024-39523",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39523"
    },
    {
      "cve": "CVE-2024-39524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39524"
    },
    {
      "cve": "CVE-2024-39528",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39528"
    },
    {
      "cve": "CVE-2024-39529",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39529"
    },
    {
      "cve": "CVE-2024-39530",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39530"
    },
    {
      "cve": "CVE-2024-39531",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39531"
    },
    {
      "cve": "CVE-2024-39532",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39532"
    },
    {
      "cve": "CVE-2024-39533",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39533"
    },
    {
      "cve": "CVE-2024-39535",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39535"
    },
    {
      "cve": "CVE-2024-39536",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39536"
    },
    {
      "cve": "CVE-2024-39537",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39537"
    },
    {
      "cve": "CVE-2024-39538",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39538"
    },
    {
      "cve": "CVE-2024-39539",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39539"
    },
    {
      "cve": "CVE-2024-39540",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39540"
    },
    {
      "cve": "CVE-2024-39541",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39541"
    },
    {
      "cve": "CVE-2024-39542",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39542"
    },
    {
      "cve": "CVE-2024-39543",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39543"
    },
    {
      "cve": "CVE-2024-39545",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39545"
    },
    {
      "cve": "CVE-2024-39546",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39546"
    },
    {
      "cve": "CVE-2024-39548",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39548"
    },
    {
      "cve": "CVE-2024-39549",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39549"
    },
    {
      "cve": "CVE-2024-39550",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39550"
    },
    {
      "cve": "CVE-2024-39551",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39551"
    },
    {
      "cve": "CVE-2024-39553",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39553"
    },
    {
      "cve": "CVE-2024-39554",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39554"
    },
    {
      "cve": "CVE-2024-39555",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39555"
    },
    {
      "cve": "CVE-2024-39556",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39556"
    },
    {
      "cve": "CVE-2024-39557",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39557"
    },
    {
      "cve": "CVE-2024-39558",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39558"
    },
    {
      "cve": "CVE-2024-39559",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39559"
    },
    {
      "cve": "CVE-2024-39560",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39560"
    },
    {
      "cve": "CVE-2024-39561",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39561"
    },
    {
      "cve": "CVE-2024-39565",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39565"
    }
  ]
}
  WID-SEC-W-2023-0063
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Junos Space ist eine Software-Plattform, die eine Reihe von Applikationen f\u00fcr das Netzwerkmanagement beinhaltet.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Juniper Junos Space ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Juniper Appliance",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-0063 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0063.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-0063 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0063"
      },
      {
        "category": "external",
        "summary": "Juniper Security Advisory JSA70182 vom 2023-01-12",
        "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
      },
      {
        "category": "external",
        "summary": "Juniper Security Advisory vom 2022-01-12",
        "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11287\u0026cat=SIRT_1"
      }
    ],
    "source_lang": "en-US",
    "title": "Juniper Junos Space: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2023-01-11T23:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:41:07.526+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2023-0063",
      "initial_release_date": "2022-01-12T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-01-12T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-01-11T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Juniper aufgenommen"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Juniper Contrail Service Orchestration",
            "product": {
              "name": "Juniper Contrail Service Orchestration",
              "product_id": "T025794",
              "product_identification_helper": {
                "cpe": "cpe:/a:juniper:contrail_service_orchestration:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Juniper Junos Space \u003c 21.3R1",
            "product": {
              "name": "Juniper Junos Space \u003c 21.3R1",
              "product_id": "T021576",
              "product_identification_helper": {
                "cpe": "cpe:/a:juniper:junos_space:21.3r1"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-17543",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2019-17543"
    },
    {
      "cve": "CVE-2019-20934",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2019-20934"
    },
    {
      "cve": "CVE-2020-0543",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-0543"
    },
    {
      "cve": "CVE-2020-0548",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-0548"
    },
    {
      "cve": "CVE-2020-0549",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-0549"
    },
    {
      "cve": "CVE-2020-11022",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-11022"
    },
    {
      "cve": "CVE-2020-11023",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-11023"
    },
    {
      "cve": "CVE-2020-11668",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-11668"
    },
    {
      "cve": "CVE-2020-11984",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-11984"
    },
    {
      "cve": "CVE-2020-11993",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-11993"
    },
    {
      "cve": "CVE-2020-12362",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-12362"
    },
    {
      "cve": "CVE-2020-12363",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-12363"
    },
    {
      "cve": "CVE-2020-12364",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-12364"
    },
    {
      "cve": "CVE-2020-1927",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-1927"
    },
    {
      "cve": "CVE-2020-1934",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-1934"
    },
    {
      "cve": "CVE-2020-24489",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-24489"
    },
    {
      "cve": "CVE-2020-24511",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-24511"
    },
    {
      "cve": "CVE-2020-24512",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-24512"
    },
    {
      "cve": "CVE-2020-27170",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-27170"
    },
    {
      "cve": "CVE-2020-27777",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-27777"
    },
    {
      "cve": "CVE-2020-29443",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-29443"
    },
    {
      "cve": "CVE-2020-8625",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-8625"
    },
    {
      "cve": "CVE-2020-8648",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8695",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-8695"
    },
    {
      "cve": "CVE-2020-8696",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-8696"
    },
    {
      "cve": "CVE-2020-8698",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-8698"
    },
    {
      "cve": "CVE-2020-9490",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-9490"
    },
    {
      "cve": "CVE-2021-20254",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-20254"
    },
    {
      "cve": "CVE-2021-22555",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-22555"
    },
    {
      "cve": "CVE-2021-22901",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-22901"
    },
    {
      "cve": "CVE-2021-2341",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2341"
    },
    {
      "cve": "CVE-2021-2342",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2342"
    },
    {
      "cve": "CVE-2021-2356",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2356"
    },
    {
      "cve": "CVE-2021-2369",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2369"
    },
    {
      "cve": "CVE-2021-2372",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2372"
    },
    {
      "cve": "CVE-2021-2385",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2385"
    },
    {
      "cve": "CVE-2021-2388",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2388"
    },
    {
      "cve": "CVE-2021-2389",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2389"
    },
    {
      "cve": "CVE-2021-2390",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2390"
    },
    {
      "cve": "CVE-2021-25214",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-25214"
    },
    {
      "cve": "CVE-2021-25217",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-25217"
    },
    {
      "cve": "CVE-2021-27219",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-27219"
    },
    {
      "cve": "CVE-2021-29154",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-29154"
    },
    {
      "cve": "CVE-2021-29650",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-29650"
    },
    {
      "cve": "CVE-2021-31535",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-31535"
    },
    {
      "cve": "CVE-2021-32399",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-32399"
    },
    {
      "cve": "CVE-2021-33033",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-33033"
    },
    {
      "cve": "CVE-2021-33034",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-33034"
    },
    {
      "cve": "CVE-2021-3347",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-3347"
    },
    {
      "cve": "CVE-2021-33909",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-3653",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-3653"
    },
    {
      "cve": "CVE-2021-3656",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-3656"
    },
    {
      "cve": "CVE-2021-3715",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-3715"
    },
    {
      "cve": "CVE-2021-37576",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-37576"
    },
    {
      "cve": "CVE-2021-4104",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-4104"
    },
    {
      "cve": "CVE-2021-42550",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-42550"
    },
    {
      "cve": "CVE-2021-44228",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-44228"
    },
    {
      "cve": "CVE-2021-45046",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-45046"
    }
  ]
}
  wid-sec-w-2023-0063
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Junos Space ist eine Software-Plattform, die eine Reihe von Applikationen f\u00fcr das Netzwerkmanagement beinhaltet.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Juniper Junos Space ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Juniper Appliance",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-0063 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0063.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-0063 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0063"
      },
      {
        "category": "external",
        "summary": "Juniper Security Advisory JSA70182 vom 2023-01-12",
        "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
      },
      {
        "category": "external",
        "summary": "Juniper Security Advisory vom 2022-01-12",
        "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11287\u0026cat=SIRT_1"
      }
    ],
    "source_lang": "en-US",
    "title": "Juniper Junos Space: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2023-01-11T23:00:00.000+00:00",
      "generator": {
        "date": "2024-08-15T17:41:07.526+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.5"
        }
      },
      "id": "WID-SEC-W-2023-0063",
      "initial_release_date": "2022-01-12T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2022-01-12T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-01-11T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Juniper aufgenommen"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Juniper Contrail Service Orchestration",
            "product": {
              "name": "Juniper Contrail Service Orchestration",
              "product_id": "T025794",
              "product_identification_helper": {
                "cpe": "cpe:/a:juniper:contrail_service_orchestration:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Juniper Junos Space \u003c 21.3R1",
            "product": {
              "name": "Juniper Junos Space \u003c 21.3R1",
              "product_id": "T021576",
              "product_identification_helper": {
                "cpe": "cpe:/a:juniper:junos_space:21.3r1"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-17543",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2019-17543"
    },
    {
      "cve": "CVE-2019-20934",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2019-20934"
    },
    {
      "cve": "CVE-2020-0543",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-0543"
    },
    {
      "cve": "CVE-2020-0548",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-0548"
    },
    {
      "cve": "CVE-2020-0549",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-0549"
    },
    {
      "cve": "CVE-2020-11022",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-11022"
    },
    {
      "cve": "CVE-2020-11023",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-11023"
    },
    {
      "cve": "CVE-2020-11668",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-11668"
    },
    {
      "cve": "CVE-2020-11984",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-11984"
    },
    {
      "cve": "CVE-2020-11993",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-11993"
    },
    {
      "cve": "CVE-2020-12362",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-12362"
    },
    {
      "cve": "CVE-2020-12363",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-12363"
    },
    {
      "cve": "CVE-2020-12364",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-12364"
    },
    {
      "cve": "CVE-2020-1927",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-1927"
    },
    {
      "cve": "CVE-2020-1934",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-1934"
    },
    {
      "cve": "CVE-2020-24489",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-24489"
    },
    {
      "cve": "CVE-2020-24511",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-24511"
    },
    {
      "cve": "CVE-2020-24512",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-24512"
    },
    {
      "cve": "CVE-2020-27170",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-27170"
    },
    {
      "cve": "CVE-2020-27777",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-27777"
    },
    {
      "cve": "CVE-2020-29443",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-29443"
    },
    {
      "cve": "CVE-2020-8625",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-8625"
    },
    {
      "cve": "CVE-2020-8648",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8695",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-8695"
    },
    {
      "cve": "CVE-2020-8696",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-8696"
    },
    {
      "cve": "CVE-2020-8698",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-8698"
    },
    {
      "cve": "CVE-2020-9490",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2020-9490"
    },
    {
      "cve": "CVE-2021-20254",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-20254"
    },
    {
      "cve": "CVE-2021-22555",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-22555"
    },
    {
      "cve": "CVE-2021-22901",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-22901"
    },
    {
      "cve": "CVE-2021-2341",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2341"
    },
    {
      "cve": "CVE-2021-2342",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2342"
    },
    {
      "cve": "CVE-2021-2356",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2356"
    },
    {
      "cve": "CVE-2021-2369",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2369"
    },
    {
      "cve": "CVE-2021-2372",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2372"
    },
    {
      "cve": "CVE-2021-2385",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2385"
    },
    {
      "cve": "CVE-2021-2388",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2388"
    },
    {
      "cve": "CVE-2021-2389",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2389"
    },
    {
      "cve": "CVE-2021-2390",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-2390"
    },
    {
      "cve": "CVE-2021-25214",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-25214"
    },
    {
      "cve": "CVE-2021-25217",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-25217"
    },
    {
      "cve": "CVE-2021-27219",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-27219"
    },
    {
      "cve": "CVE-2021-29154",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-29154"
    },
    {
      "cve": "CVE-2021-29650",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-29650"
    },
    {
      "cve": "CVE-2021-31535",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-31535"
    },
    {
      "cve": "CVE-2021-32399",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-32399"
    },
    {
      "cve": "CVE-2021-33033",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-33033"
    },
    {
      "cve": "CVE-2021-33034",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-33034"
    },
    {
      "cve": "CVE-2021-3347",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-3347"
    },
    {
      "cve": "CVE-2021-33909",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-3653",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-3653"
    },
    {
      "cve": "CVE-2021-3656",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-3656"
    },
    {
      "cve": "CVE-2021-3715",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-3715"
    },
    {
      "cve": "CVE-2021-37576",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-37576"
    },
    {
      "cve": "CVE-2021-4104",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-4104"
    },
    {
      "cve": "CVE-2021-42550",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-42550"
    },
    {
      "cve": "CVE-2021-44228",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-44228"
    },
    {
      "cve": "CVE-2021-45046",
      "notes": [
        {
          "category": "description",
          "text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
        }
      ],
      "product_status": {
        "known_affected": [
          "T025794"
        ]
      },
      "release_date": "2022-01-12T23:00:00.000+00:00",
      "title": "CVE-2021-45046"
    }
  ]
}
  wid-sec-w-2024-1591
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service  zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-1591 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-1591 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
      },
      {
        "category": "external",
        "summary": "Juniper Patchday July 2024 vom 2024-07-10",
        "url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
      }
    ],
    "source_lang": "en-US",
    "title": "Juniper JUNOS: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-11-11T23:00:00.000+00:00",
      "generator": {
        "date": "2024-11-12T09:31:28.569+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.8"
        }
      },
      "id": "WID-SEC-W-2024-1591",
      "initial_release_date": "2024-07-10T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-07-10T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-11-11T23:00:00.000+00:00",
          "number": "2",
          "summary": "URL Kodierung angepasst"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Juniper JUNOS",
            "product": {
              "name": "Juniper JUNOS",
              "product_id": "T036093",
              "product_identification_helper": {
                "cpe": "cpe:/o:juniper:junos:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2006-20001",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2006-20001"
    },
    {
      "cve": "CVE-2007-5846",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2007-5846"
    },
    {
      "cve": "CVE-2008-6123",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2008-6123"
    },
    {
      "cve": "CVE-2011-1473",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2011-1473"
    },
    {
      "cve": "CVE-2011-5094",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2011-5094"
    },
    {
      "cve": "CVE-2012-6151",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2012-6151"
    },
    {
      "cve": "CVE-2014-10064",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-10064"
    },
    {
      "cve": "CVE-2014-2285",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-2285"
    },
    {
      "cve": "CVE-2014-2310",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-2310"
    },
    {
      "cve": "CVE-2014-3565",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-3565"
    },
    {
      "cve": "CVE-2014-7191",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-7191"
    },
    {
      "cve": "CVE-2014-8882",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2014-8882"
    },
    {
      "cve": "CVE-2015-5621",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-5621"
    },
    {
      "cve": "CVE-2015-8100",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-8100"
    },
    {
      "cve": "CVE-2015-9262",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2015-9262"
    },
    {
      "cve": "CVE-2016-1000232",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-1000232"
    },
    {
      "cve": "CVE-2016-10540",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-10540"
    },
    {
      "cve": "CVE-2016-4658",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2016-4658"
    },
    {
      "cve": "CVE-2017-1000048",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2017-1000048"
    },
    {
      "cve": "CVE-2017-15010",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2017-15010"
    },
    {
      "cve": "CVE-2018-18065",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-18065"
    },
    {
      "cve": "CVE-2018-20834",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-20834"
    },
    {
      "cve": "CVE-2018-3737",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-3737"
    },
    {
      "cve": "CVE-2018-7408",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2018-7408"
    },
    {
      "cve": "CVE-2019-10081",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10081"
    },
    {
      "cve": "CVE-2019-10082",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10082"
    },
    {
      "cve": "CVE-2019-10092",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10092"
    },
    {
      "cve": "CVE-2019-10097",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10097"
    },
    {
      "cve": "CVE-2019-10098",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-10098"
    },
    {
      "cve": "CVE-2019-11719",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11719"
    },
    {
      "cve": "CVE-2019-11727",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11727"
    },
    {
      "cve": "CVE-2019-11756",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-11756"
    },
    {
      "cve": "CVE-2019-16775",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16775"
    },
    {
      "cve": "CVE-2019-16776",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16776"
    },
    {
      "cve": "CVE-2019-16777",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-16777"
    },
    {
      "cve": "CVE-2019-17006",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17006"
    },
    {
      "cve": "CVE-2019-17023",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17023"
    },
    {
      "cve": "CVE-2019-17567",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-17567"
    },
    {
      "cve": "CVE-2019-20149",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-20149"
    },
    {
      "cve": "CVE-2019-20892",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-20892"
    },
    {
      "cve": "CVE-2019-9517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2019-9517"
    },
    {
      "cve": "CVE-2020-11668",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11668"
    },
    {
      "cve": "CVE-2020-11984",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11984"
    },
    {
      "cve": "CVE-2020-11993",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-11993"
    },
    {
      "cve": "CVE-2020-12362",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12362"
    },
    {
      "cve": "CVE-2020-12400",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12400"
    },
    {
      "cve": "CVE-2020-12401",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12401"
    },
    {
      "cve": "CVE-2020-12402",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12402"
    },
    {
      "cve": "CVE-2020-12403",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-12403"
    },
    {
      "cve": "CVE-2020-13938",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-13938"
    },
    {
      "cve": "CVE-2020-13950",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-13950"
    },
    {
      "cve": "CVE-2020-14145",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-14145"
    },
    {
      "cve": "CVE-2020-15861",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-15861"
    },
    {
      "cve": "CVE-2020-15862",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-15862"
    },
    {
      "cve": "CVE-2020-1927",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-1927"
    },
    {
      "cve": "CVE-2020-1934",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-1934"
    },
    {
      "cve": "CVE-2020-28469",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-28469"
    },
    {
      "cve": "CVE-2020-28502",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-28502"
    },
    {
      "cve": "CVE-2020-35452",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-35452"
    },
    {
      "cve": "CVE-2020-36049",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-36049"
    },
    {
      "cve": "CVE-2020-6829",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-6829"
    },
    {
      "cve": "CVE-2020-7660",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7660"
    },
    {
      "cve": "CVE-2020-7754",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7754"
    },
    {
      "cve": "CVE-2020-7774",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-7774"
    },
    {
      "cve": "CVE-2020-8648",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-9490",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2020-9490"
    },
    {
      "cve": "CVE-2021-22543",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-22543"
    },
    {
      "cve": "CVE-2021-2342",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2342"
    },
    {
      "cve": "CVE-2021-23440",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-23440"
    },
    {
      "cve": "CVE-2021-2356",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2356"
    },
    {
      "cve": "CVE-2021-2372",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2372"
    },
    {
      "cve": "CVE-2021-2385",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2385"
    },
    {
      "cve": "CVE-2021-2389",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2389"
    },
    {
      "cve": "CVE-2021-2390",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-2390"
    },
    {
      "cve": "CVE-2021-25745",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25745"
    },
    {
      "cve": "CVE-2021-25746",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25746"
    },
    {
      "cve": "CVE-2021-25748",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-25748"
    },
    {
      "cve": "CVE-2021-26690",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-26690"
    },
    {
      "cve": "CVE-2021-26691",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-26691"
    },
    {
      "cve": "CVE-2021-27290",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-27290"
    },
    {
      "cve": "CVE-2021-29469",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-29469"
    },
    {
      "cve": "CVE-2021-30641",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-30641"
    },
    {
      "cve": "CVE-2021-31535",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-31535"
    },
    {
      "cve": "CVE-2021-31618",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-31618"
    },
    {
      "cve": "CVE-2021-3177",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3177"
    },
    {
      "cve": "CVE-2021-32803",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-32803"
    },
    {
      "cve": "CVE-2021-32804",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-32804"
    },
    {
      "cve": "CVE-2021-33033",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33033"
    },
    {
      "cve": "CVE-2021-33034",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33034"
    },
    {
      "cve": "CVE-2021-33193",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33193"
    },
    {
      "cve": "CVE-2021-3347",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3347"
    },
    {
      "cve": "CVE-2021-33909",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-33909"
    },
    {
      "cve": "CVE-2021-34798",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-34798"
    },
    {
      "cve": "CVE-2021-35604",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-35604"
    },
    {
      "cve": "CVE-2021-35624",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-35624"
    },
    {
      "cve": "CVE-2021-36160",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-36160"
    },
    {
      "cve": "CVE-2021-37701",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37701"
    },
    {
      "cve": "CVE-2021-37712",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37712"
    },
    {
      "cve": "CVE-2021-37713",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-37713"
    },
    {
      "cve": "CVE-2021-3803",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-3803"
    },
    {
      "cve": "CVE-2021-39275",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-39275"
    },
    {
      "cve": "CVE-2021-40438",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-40438"
    },
    {
      "cve": "CVE-2021-41524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-41524"
    },
    {
      "cve": "CVE-2021-41773",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-41773"
    },
    {
      "cve": "CVE-2021-42013",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-42013"
    },
    {
      "cve": "CVE-2021-43527",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-43527"
    },
    {
      "cve": "CVE-2021-44224",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44224"
    },
    {
      "cve": "CVE-2021-44225",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44225"
    },
    {
      "cve": "CVE-2021-44790",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44790"
    },
    {
      "cve": "CVE-2021-44906",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2021-44906"
    },
    {
      "cve": "CVE-2022-21245",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21245"
    },
    {
      "cve": "CVE-2022-21270",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21270"
    },
    {
      "cve": "CVE-2022-21303",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21303"
    },
    {
      "cve": "CVE-2022-21304",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21304"
    },
    {
      "cve": "CVE-2022-21344",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21344"
    },
    {
      "cve": "CVE-2022-21367",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21367"
    },
    {
      "cve": "CVE-2022-21417",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21417"
    },
    {
      "cve": "CVE-2022-21427",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21427"
    },
    {
      "cve": "CVE-2022-21444",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21444"
    },
    {
      "cve": "CVE-2022-21451",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21451"
    },
    {
      "cve": "CVE-2022-21454",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21454"
    },
    {
      "cve": "CVE-2022-21460",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21460"
    },
    {
      "cve": "CVE-2022-21589",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21589"
    },
    {
      "cve": "CVE-2022-21592",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21592"
    },
    {
      "cve": "CVE-2022-21595",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21595"
    },
    {
      "cve": "CVE-2022-21608",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21608"
    },
    {
      "cve": "CVE-2022-21617",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-21617"
    },
    {
      "cve": "CVE-2022-22719",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22719"
    },
    {
      "cve": "CVE-2022-22720",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22720"
    },
    {
      "cve": "CVE-2022-22721",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22721"
    },
    {
      "cve": "CVE-2022-22822",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22822"
    },
    {
      "cve": "CVE-2022-22823",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22823"
    },
    {
      "cve": "CVE-2022-22824",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-22824"
    },
    {
      "cve": "CVE-2022-23471",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23471"
    },
    {
      "cve": "CVE-2022-23524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23524"
    },
    {
      "cve": "CVE-2022-23525",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23525"
    },
    {
      "cve": "CVE-2022-23526",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23526"
    },
    {
      "cve": "CVE-2022-23852",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23852"
    },
    {
      "cve": "CVE-2022-23943",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-23943"
    },
    {
      "cve": "CVE-2022-25147",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25147"
    },
    {
      "cve": "CVE-2022-25235",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25235"
    },
    {
      "cve": "CVE-2022-25236",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25236"
    },
    {
      "cve": "CVE-2022-2526",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-2526"
    },
    {
      "cve": "CVE-2022-25315",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-25315"
    },
    {
      "cve": "CVE-2022-26377",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-26377"
    },
    {
      "cve": "CVE-2022-28330",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28330"
    },
    {
      "cve": "CVE-2022-28614",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28614"
    },
    {
      "cve": "CVE-2022-28615",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-28615"
    },
    {
      "cve": "CVE-2022-29167",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-29167"
    },
    {
      "cve": "CVE-2022-29404",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-29404"
    },
    {
      "cve": "CVE-2022-30522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-30522"
    },
    {
      "cve": "CVE-2022-30556",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-30556"
    },
    {
      "cve": "CVE-2022-31813",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-31813"
    },
    {
      "cve": "CVE-2022-3517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-3517"
    },
    {
      "cve": "CVE-2022-3564",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-3564"
    },
    {
      "cve": "CVE-2022-36760",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-36760"
    },
    {
      "cve": "CVE-2022-37434",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-37434"
    },
    {
      "cve": "CVE-2022-37436",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-37436"
    },
    {
      "cve": "CVE-2022-40674",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-40674"
    },
    {
      "cve": "CVE-2022-41741",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-41741"
    },
    {
      "cve": "CVE-2022-41742",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-41742"
    },
    {
      "cve": "CVE-2022-4203",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4203"
    },
    {
      "cve": "CVE-2022-4304",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4304"
    },
    {
      "cve": "CVE-2022-4450",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4450"
    },
    {
      "cve": "CVE-2022-46663",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-46663"
    },
    {
      "cve": "CVE-2022-4886",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2022-4886"
    },
    {
      "cve": "CVE-2023-0215",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0215"
    },
    {
      "cve": "CVE-2023-0216",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0216"
    },
    {
      "cve": "CVE-2023-0217",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0217"
    },
    {
      "cve": "CVE-2023-0286",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0286"
    },
    {
      "cve": "CVE-2023-0401",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0401"
    },
    {
      "cve": "CVE-2023-0464",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0464"
    },
    {
      "cve": "CVE-2023-0465",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0465"
    },
    {
      "cve": "CVE-2023-0466",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0466"
    },
    {
      "cve": "CVE-2023-0767",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-0767"
    },
    {
      "cve": "CVE-2023-1255",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-1255"
    },
    {
      "cve": "CVE-2023-2002",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2002"
    },
    {
      "cve": "CVE-2023-20593",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-20593"
    },
    {
      "cve": "CVE-2023-21830",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21830"
    },
    {
      "cve": "CVE-2023-21840",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21840"
    },
    {
      "cve": "CVE-2023-21843",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21843"
    },
    {
      "cve": "CVE-2023-21912",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21912"
    },
    {
      "cve": "CVE-2023-21963",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21963"
    },
    {
      "cve": "CVE-2023-21980",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-21980"
    },
    {
      "cve": "CVE-2023-22025",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22025"
    },
    {
      "cve": "CVE-2023-22067",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22067"
    },
    {
      "cve": "CVE-2023-22081",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22081"
    },
    {
      "cve": "CVE-2023-22652",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-22652"
    },
    {
      "cve": "CVE-2023-24329",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-24329"
    },
    {
      "cve": "CVE-2023-25153",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25153"
    },
    {
      "cve": "CVE-2023-25173",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25173"
    },
    {
      "cve": "CVE-2023-25690",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-25690"
    },
    {
      "cve": "CVE-2023-2700",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2700"
    },
    {
      "cve": "CVE-2023-27522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-27522"
    },
    {
      "cve": "CVE-2023-2828",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2828"
    },
    {
      "cve": "CVE-2023-28840",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28840"
    },
    {
      "cve": "CVE-2023-28841",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28841"
    },
    {
      "cve": "CVE-2023-28842",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-28842"
    },
    {
      "cve": "CVE-2023-2975",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-2975"
    },
    {
      "cve": "CVE-2023-30079",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-30079"
    },
    {
      "cve": "CVE-2023-30630",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-30630"
    },
    {
      "cve": "CVE-2023-3090",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3090"
    },
    {
      "cve": "CVE-2023-32067",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32067"
    },
    {
      "cve": "CVE-2023-32360",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32360"
    },
    {
      "cve": "CVE-2023-32435",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32435"
    },
    {
      "cve": "CVE-2023-32439",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32439"
    },
    {
      "cve": "CVE-2023-32732",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-32732"
    },
    {
      "cve": "CVE-2023-3341",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3341"
    },
    {
      "cve": "CVE-2023-3390",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3390"
    },
    {
      "cve": "CVE-2023-33953",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-33953"
    },
    {
      "cve": "CVE-2023-34058",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34058"
    },
    {
      "cve": "CVE-2023-34059",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34059"
    },
    {
      "cve": "CVE-2023-3446",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3446"
    },
    {
      "cve": "CVE-2023-34969",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-34969"
    },
    {
      "cve": "CVE-2023-35001",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-35001"
    },
    {
      "cve": "CVE-2023-35788",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-35788"
    },
    {
      "cve": "CVE-2023-3611",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3611"
    },
    {
      "cve": "CVE-2023-37450",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-37450"
    },
    {
      "cve": "CVE-2023-3776",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3776"
    },
    {
      "cve": "CVE-2023-3817",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-3817"
    },
    {
      "cve": "CVE-2023-4004",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4004"
    },
    {
      "cve": "CVE-2023-4206",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4206"
    },
    {
      "cve": "CVE-2023-4207",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4207"
    },
    {
      "cve": "CVE-2023-4208",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4208"
    },
    {
      "cve": "CVE-2023-42753",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-42753"
    },
    {
      "cve": "CVE-2023-4785",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4785"
    },
    {
      "cve": "CVE-2023-4807",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4807"
    },
    {
      "cve": "CVE-2023-4863",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-4863"
    },
    {
      "cve": "CVE-2023-5043",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5043"
    },
    {
      "cve": "CVE-2023-5129",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5129"
    },
    {
      "cve": "CVE-2023-5363",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2023-5363"
    },
    {
      "cve": "CVE-2024-20918",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20918"
    },
    {
      "cve": "CVE-2024-20919",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20919"
    },
    {
      "cve": "CVE-2024-20921",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20921"
    },
    {
      "cve": "CVE-2024-20926",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20926"
    },
    {
      "cve": "CVE-2024-20932",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20932"
    },
    {
      "cve": "CVE-2024-20945",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20945"
    },
    {
      "cve": "CVE-2024-20952",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-20952"
    },
    {
      "cve": "CVE-2024-39511",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39511"
    },
    {
      "cve": "CVE-2024-39512",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39512"
    },
    {
      "cve": "CVE-2024-39513",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39513"
    },
    {
      "cve": "CVE-2024-39514",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39514"
    },
    {
      "cve": "CVE-2024-39517",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39517"
    },
    {
      "cve": "CVE-2024-39518",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39518"
    },
    {
      "cve": "CVE-2024-39519",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39519"
    },
    {
      "cve": "CVE-2024-39520",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39520"
    },
    {
      "cve": "CVE-2024-39521",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39521"
    },
    {
      "cve": "CVE-2024-39522",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39522"
    },
    {
      "cve": "CVE-2024-39523",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39523"
    },
    {
      "cve": "CVE-2024-39524",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39524"
    },
    {
      "cve": "CVE-2024-39528",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39528"
    },
    {
      "cve": "CVE-2024-39529",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39529"
    },
    {
      "cve": "CVE-2024-39530",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39530"
    },
    {
      "cve": "CVE-2024-39531",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39531"
    },
    {
      "cve": "CVE-2024-39532",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39532"
    },
    {
      "cve": "CVE-2024-39533",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39533"
    },
    {
      "cve": "CVE-2024-39535",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39535"
    },
    {
      "cve": "CVE-2024-39536",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39536"
    },
    {
      "cve": "CVE-2024-39537",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39537"
    },
    {
      "cve": "CVE-2024-39538",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39538"
    },
    {
      "cve": "CVE-2024-39539",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39539"
    },
    {
      "cve": "CVE-2024-39540",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39540"
    },
    {
      "cve": "CVE-2024-39541",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39541"
    },
    {
      "cve": "CVE-2024-39542",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39542"
    },
    {
      "cve": "CVE-2024-39543",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39543"
    },
    {
      "cve": "CVE-2024-39545",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39545"
    },
    {
      "cve": "CVE-2024-39546",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39546"
    },
    {
      "cve": "CVE-2024-39548",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39548"
    },
    {
      "cve": "CVE-2024-39549",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39549"
    },
    {
      "cve": "CVE-2024-39550",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39550"
    },
    {
      "cve": "CVE-2024-39551",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39551"
    },
    {
      "cve": "CVE-2024-39553",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39553"
    },
    {
      "cve": "CVE-2024-39554",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39554"
    },
    {
      "cve": "CVE-2024-39555",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39555"
    },
    {
      "cve": "CVE-2024-39556",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39556"
    },
    {
      "cve": "CVE-2024-39557",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39557"
    },
    {
      "cve": "CVE-2024-39558",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39558"
    },
    {
      "cve": "CVE-2024-39559",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39559"
    },
    {
      "cve": "CVE-2024-39560",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39560"
    },
    {
      "cve": "CVE-2024-39561",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39561"
    },
    {
      "cve": "CVE-2024-39565",
      "notes": [
        {
          "category": "description",
          "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036093"
        ]
      },
      "release_date": "2024-07-10T22:00:00.000+00:00",
      "title": "CVE-2024-39565"
    }
  ]
}
  ghsa-9hr4-45xh-6xvh
Vulnerability from github
There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.
{
  "affected": [],
  "aliases": [
    "CVE-2020-8648"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-416"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2020-02-06T01:15:00Z",
    "severity": "LOW"
  },
  "details": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
  "id": "GHSA-9hr4-45xh-6xvh",
  "modified": "2022-07-29T00:00:53Z",
  "published": "2022-05-24T17:08:11Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.kernel.org/show_bug.cgi?id=206361"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
    },
    {
      "type": "WEB",
      "url": "https://security.netapp.com/advisory/ntap-20200924-0004"
    },
    {
      "type": "WEB",
      "url": "https://usn.ubuntu.com/4342-1"
    },
    {
      "type": "WEB",
      "url": "https://usn.ubuntu.com/4344-1"
    },
    {
      "type": "WEB",
      "url": "https://usn.ubuntu.com/4345-1"
    },
    {
      "type": "WEB",
      "url": "https://usn.ubuntu.com/4346-1"
    },
    {
      "type": "WEB",
      "url": "https://www.debian.org/security/2020/dsa-4698"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  gsd-2020-8648
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2020-8648",
    "description": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
    "id": "GSD-2020-8648",
    "references": [
      "https://www.suse.com/security/cve/CVE-2020-8648.html",
      "https://www.debian.org/security/2020/dsa-4698",
      "https://access.redhat.com/errata/RHSA-2021:3522",
      "https://access.redhat.com/errata/RHSA-2021:3320",
      "https://access.redhat.com/errata/RHSA-2021:2316",
      "https://access.redhat.com/errata/RHSA-2021:2314",
      "https://access.redhat.com/errata/RHSA-2020:4609",
      "https://access.redhat.com/errata/RHSA-2020:4431",
      "https://ubuntu.com/security/CVE-2020-8648",
      "https://advisories.mageia.org/CVE-2020-8648.html",
      "https://alas.aws.amazon.com/cve/html/CVE-2020-8648.html",
      "https://linux.oracle.com/cve/CVE-2020-8648.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2020-8648"
      ],
      "details": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
      "id": "GSD-2020-8648",
      "modified": "2023-12-13T01:21:54.315570Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2020-8648",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://bugzilla.kernel.org/show_bug.cgi?id=206361",
            "refsource": "MISC",
            "url": "https://bugzilla.kernel.org/show_bug.cgi?id=206361"
          },
          {
            "name": "openSUSE-SU-2020:0336",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"
          },
          {
            "name": "USN-4344-1",
            "refsource": "UBUNTU",
            "url": "https://usn.ubuntu.com/4344-1/"
          },
          {
            "name": "USN-4345-1",
            "refsource": "UBUNTU",
            "url": "https://usn.ubuntu.com/4345-1/"
          },
          {
            "name": "USN-4342-1",
            "refsource": "UBUNTU",
            "url": "https://usn.ubuntu.com/4342-1/"
          },
          {
            "name": "USN-4346-1",
            "refsource": "UBUNTU",
            "url": "https://usn.ubuntu.com/4346-1/"
          },
          {
            "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
            "refsource": "MLIST",
            "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
          },
          {
            "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
            "refsource": "MLIST",
            "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
          },
          {
            "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
            "refsource": "MLIST",
            "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
          },
          {
            "name": "DSA-4698",
            "refsource": "DEBIAN",
            "url": "https://www.debian.org/security/2020/dsa-4698"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20200924-0004/",
            "refsource": "CONFIRM",
            "url": "https://security.netapp.com/advisory/ntap-20200924-0004/"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "5.5.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-8648"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-416"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.kernel.org/show_bug.cgi?id=206361",
              "refsource": "MISC",
              "tags": [
                "Exploit",
                "Issue Tracking",
                "Vendor Advisory"
              ],
              "url": "https://bugzilla.kernel.org/show_bug.cgi?id=206361"
            },
            {
              "name": "openSUSE-SU-2020:0336",
              "refsource": "SUSE",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"
            },
            {
              "name": "USN-4344-1",
              "refsource": "UBUNTU",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://usn.ubuntu.com/4344-1/"
            },
            {
              "name": "USN-4345-1",
              "refsource": "UBUNTU",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://usn.ubuntu.com/4345-1/"
            },
            {
              "name": "USN-4342-1",
              "refsource": "UBUNTU",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://usn.ubuntu.com/4342-1/"
            },
            {
              "name": "USN-4346-1",
              "refsource": "UBUNTU",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://usn.ubuntu.com/4346-1/"
            },
            {
              "name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
            },
            {
              "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
            },
            {
              "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
            },
            {
              "name": "DSA-4698",
              "refsource": "DEBIAN",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://www.debian.org/security/2020/dsa-4698"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200924-0004/",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.netapp.com/advisory/ntap-20200924-0004/"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 4.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "LOW",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "exploitabilityScore": 1.8,
          "impactScore": 5.2
        }
      },
      "lastModifiedDate": "2022-07-28T00:08Z",
      "publishedDate": "2020-02-06T01:15Z"
    }
  }
}
  msrc_cve-2020-8648
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2020-8648 There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c. - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2020/msrc_cve-2020-8648.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
    "tracking": {
      "current_release_date": "2020-08-18T00:00:00.000Z",
      "generator": {
        "date": "2025-10-19T17:51:18.714Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2020-8648",
      "initial_release_date": "2020-02-02T00:00:00.000Z",
      "revision_history": [
        {
          "date": "2020-08-18T00:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "1.0",
                "product": {
                  "name": "CBL Mariner 1.0",
                  "product_id": "16820"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccm1 kernel 5.4.91-11",
                "product": {
                  "name": "\u003ccm1 kernel 5.4.91-11",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "cm1 kernel 5.4.91-11",
                "product": {
                  "name": "cm1 kernel 5.4.91-11",
                  "product_id": "19156"
                }
              }
            ],
            "category": "product_name",
            "name": "kernel"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccm1 kernel 5.4.91-11 as a component of CBL Mariner 1.0",
          "product_id": "16820-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "16820"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cm1 kernel 5.4.91-11 as a component of CBL Mariner 1.0",
          "product_id": "19156-16820"
        },
        "product_reference": "19156",
        "relates_to_product_reference": "16820"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-8648",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "general",
          "text": "mitre",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "19156-16820"
        ],
        "known_affected": [
          "16820-1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-8648 There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c. - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2020/msrc_cve-2020-8648.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2020-08-18T00:00:00.000Z",
          "details": "5.4.91-11:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "16820-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalsScore": 0.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 7.1,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "16820-1"
          ]
        }
      ],
      "title": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c."
    }
  ]
}
  fkie_cve-2020-8648
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://bugzilla.kernel.org/show_bug.cgi?id=206361 | Exploit, Issue Tracking, Vendor Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://security.netapp.com/advisory/ntap-20200924-0004/ | Third Party Advisory | |
| cve@mitre.org | https://usn.ubuntu.com/4342-1/ | Third Party Advisory | |
| cve@mitre.org | https://usn.ubuntu.com/4344-1/ | Third Party Advisory | |
| cve@mitre.org | https://usn.ubuntu.com/4345-1/ | Third Party Advisory | |
| cve@mitre.org | https://usn.ubuntu.com/4346-1/ | Third Party Advisory | |
| cve@mitre.org | https://www.debian.org/security/2020/dsa-4698 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.kernel.org/show_bug.cgi?id=206361 | Exploit, Issue Tracking, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20200924-0004/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4342-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4344-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4345-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4346-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2020/dsa-4698 | Third Party Advisory | 
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| debian | debian_linux | 8.0 | |
| opensuse | leap | 15.1 | |
| netapp | active_iq_unified_manager | - | |
| netapp | cloud_backup | - | |
| netapp | hci_baseboard_management_controller | h410c | |
| netapp | solidfire_baseboard_management_controller | - | |
| broadcom | brocade_fabric_operating_system_firmware | - | |
| canonical | ubuntu_linux | 14.04 | |
| canonical | ubuntu_linux | 16.04 | |
| canonical | ubuntu_linux | 16.04 | |
| canonical | ubuntu_linux | 18.04 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "40157F12-F9F5-4A92-A0FA-213D2809B839",
              "versionEndIncluding": "5.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
              "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*",
              "matchCriteriaId": "489D20B9-166F-423D-8C48-A23D3026E33B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83FAD281-BF77-4A8A-8F29-B557A6903BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2748912-FC54-47F6-8C0C-B96784765B8E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad de uso de la memoria previamente liberada en el kernel de Linux versiones hasta 5.5.2, en la funci\u00f3n n_tty_receive_buf_common en el archivo drivers/tty/n_tty.c."
    }
  ],
  "id": "CVE-2020-8648",
  "lastModified": "2024-11-21T05:39:11.030",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-02-06T01:15:10.890",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.kernel.org/show_bug.cgi?id=206361"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200924-0004/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4342-1/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4344-1/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4345-1/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4346-1/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2020/dsa-4698"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.kernel.org/show_bug.cgi?id=206361"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200924-0004/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4342-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4344-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4345-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4346-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2020/dsa-4698"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  var-202002-1243
Vulnerability from variot
There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c. 7.6) - noarch, x86_64
- ========================================================================== Ubuntu Security Notice USN-4345-1 April 28, 2020
linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2020-11884)
It was discovered that the Intel Wi-Fi driver in the Linux kernel did not properly check for errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2019-16234)
Tristan Madani discovered that the block I/O tracing implementation in the Linux kernel contained a race condition. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2019-19768)
It was discovered that the vhost net driver in the Linux kernel contained a stack buffer overflow. A local attacker with the ability to perform ioctl() calls on /dev/vhost-net could use this to cause a denial of service (system crash). (CVE-2020-10942)
It was discovered that the OV51x USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11608)
It was discovered that the STV06XX USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2020-11609)
It was discovered that the Xirlink C-It USB Camera device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). A local attacker could possibly use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2020-8648)
Jordy Zomer discovered that the floppy driver in the Linux kernel did not properly check for errors in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2020-9383)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS: linux-image-4.15.0-1038-oracle 4.15.0-1038.42 linux-image-4.15.0-1058-gke 4.15.0-1058.61 linux-image-4.15.0-1059-kvm 4.15.0-1059.60 linux-image-4.15.0-1061-raspi2 4.15.0-1061.65 linux-image-4.15.0-1066-aws 4.15.0-1066.70 linux-image-4.15.0-1077-snapdragon 4.15.0-1077.84 linux-image-4.15.0-1080-oem 4.15.0-1080.90 linux-image-4.15.0-99-generic 4.15.0-99.100 linux-image-4.15.0-99-generic-lpae 4.15.0-99.100 linux-image-4.15.0-99-lowlatency 4.15.0-99.100 linux-image-aws-lts-18.04 4.15.0.1066.69 linux-image-generic 4.15.0.99.89 linux-image-generic-lpae 4.15.0.99.89 linux-image-gke 4.15.0.1058.62 linux-image-gke-4.15 4.15.0.1058.62 linux-image-kvm 4.15.0.1059.59 linux-image-lowlatency 4.15.0.99.89 linux-image-oem 4.15.0.1080.84 linux-image-oracle-lts-18.04 4.15.0.1038.47 linux-image-powerpc-e500mc 4.15.0.99.89 linux-image-powerpc-smp 4.15.0.99.89 linux-image-powerpc64-emb 4.15.0.99.89 linux-image-powerpc64-smp 4.15.0.99.89 linux-image-raspi2 4.15.0.1061.59 linux-image-snapdragon 4.15.0.1077.80 linux-image-virtual 4.15.0.99.89
Ubuntu 16.04 LTS: linux-image-4.15.0-1038-oracle 4.15.0-1038.42~16.04.1 linux-image-4.15.0-1061-gcp 4.15.0-1061.65 linux-image-4.15.0-1066-aws 4.15.0-1066.70~16.04.1 linux-image-4.15.0-1082-azure 4.15.0-1082.92~16.04.1 linux-image-4.15.0-99-generic 4.15.0-99.100~16.04.1 linux-image-4.15.0-99-generic-lpae 4.15.0-99.100~16.04.1 linux-image-4.15.0-99-lowlatency 4.15.0-99.100~16.04.1 linux-image-aws-hwe 4.15.0.1066.66 linux-image-azure 4.15.0.1082.81 linux-image-azure-edge 4.15.0.1082.81 linux-image-gcp 4.15.0.1061.75 linux-image-generic-hwe-16.04 4.15.0.99.106 linux-image-generic-lpae-hwe-16.04 4.15.0.99.106 linux-image-gke 4.15.0.1061.75 linux-image-lowlatency-hwe-16.04 4.15.0.99.106 linux-image-oem 4.15.0.99.106 linux-image-oracle 4.15.0.1038.31 linux-image-virtual-hwe-16.04 4.15.0.99.106
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Description:
Red Hat Advanced Cluster Management for Kubernetes 2.2.4 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.2/html/release_notes/
Security fixes:
- 
redisgraph-tls: redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms (CVE-2021-21309) 
- 
console-header-container: nodejs-netmask: improper input validation of octal input data (CVE-2021-28092) 
- 
console-container: nodejs-is-svg: ReDoS via malicious string (CVE-2021-28918) 
Bug fixes:
- 
RHACM 2.2.4 images (BZ# 1957254) 
- 
Enabling observability for OpenShift Container Storage with RHACM 2.2 on OCP 4.7 (BZ#1950832) 
- 
ACM Operator should support using the default route TLS (BZ# 1955270) 
- 
The scrolling bar for search filter does not work properly (BZ# 1956852) 
- 
Limits on Length of MultiClusterObservability Resource Name (BZ# 1959426) 
- 
The proxy setup in install-config.yaml is not worked when IPI installing with RHACM (BZ# 1960181) 
- 
Unable to make SSH connection to a Bitbucket server (BZ# 1966513) 
- 
Observability Thanos store shard crashing - cannot unmarshall DNS message (BZ# 1967890) 
- 
Solution: 
Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):
1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms 1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string 1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data 1950832 - Enabling observability for OpenShift Container Storage with RHACM 2.2 on OCP 4.7 1952150 - [DDF] It would be great to see all the options available for the bucket configuration and which attributes are mandatory 1954506 - [DDF] Table does not contain data about 20 clusters. Now it's difficult to estimate CPU usage with larger clusters 1954535 - Reinstall Submariner - No endpoints found on one cluster 1955270 - ACM Operator should support using the default route TLS 1956852 - The scrolling bar for search filter does not work properly 1957254 - RHACM 2.2.4 images 1959426 - Limits on Length of MultiClusterObservability Resource Name 1960181 - The proxy setup in install-config.yaml is not worked when IPI installing with RHACM. 1963128 - [DDF] Please rename this to "Amazon Elastic Kubernetes Service" 1966513 - Unable to make SSH connection to a Bitbucket server 1967357 - [DDF] When I clicked on this yaml, I get a HTTP 404 error. 1967890 - Observability Thanos store shard crashing - cannot unmarshal DNS message
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Security Fix(es):
- 
kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362) 
- 
kernel: Use after free via PI futex state (CVE-2021-3347) 
- 
kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648) 
- 
kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363) 
- 
kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364) 
- 
kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- 
kernel crash when call the timer function (sctp_generate_proto_unreach_event) of sctp module (BZ#1707184) 
- 
SCSI error handling process on HP P440ar controller gets stuck indefinitely in device reset operation (BZ#1830268) 
- 
netfilter: reproducible deadlock on nft_log module autoload (BZ#1858329) 
- 
netfilter: NULL pointer dereference in nf_tables_set_lookup() (BZ#1873171) 
- 
[DELL EMC 7.9 Bug]: No acpi_pad threads on top command for "power cap policy equal to 0 watts" (BZ#1883174) 
- 
A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache. (BZ#1886003) 
- 
netxen driver performs poorly with RT kernel (BZ#1894274) 
- 
gendisk->disk_part_tbl->last_lookup retains pointer after partition deletion (BZ#1898596) 
- 
Kernel experiences panic in update_group_power() due to division error even with Bug 1701115 fix (BZ#1910763) 
- 
RHEL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path (BZ#1917839) 
- 
RHEL7.9 - mm/THP: do not access vma->vm_mm after calling handle_userfault (BZ#1917840) 
- 
raid: wrong raid io account (BZ#1927106) 
- 
qla2x00_status_cont_entry() missing upstream patch that prevents unnecessary ABRT/warnings (BZ#1933784) 
- 
RHEL 7.9.z - System hang caused by workqueue stall in qla2xxx driver (BZ#1937945) 
- 
selinux: setsebool can trigger a deadlock (BZ#1939091) 
- 
[Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V (BZ#1941841) 
- 
Solution: 
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect. Bugs fixed (https://bugzilla.redhat.com/):
1802559 - CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c 1922249 - CVE-2021-3347 kernel: Use after free via PI futex state 1930246 - CVE-2020-12362 kernel: Integer overflow in Intel(R) Graphics Drivers 1930249 - CVE-2020-12363 kernel: Improper input validation in some Intel(R) Graphics Drivers 1930251 - CVE-2020-12364 kernel: Null pointer dereference in some Intel(R) Graphics Drivers 1940627 - CVE-2020-27170 kernel: Speculation on pointer arithmetic against bpf_context pointer 1941841 - [Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: kernel-3.10.0-1160.31.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
x86_64: bpftool-3.10.0-1160.31.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm perf-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
Source: kernel-3.10.0-1160.31.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
x86_64: bpftool-3.10.0-1160.31.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm perf-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: kernel-3.10.0-1160.31.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
ppc64: bpftool-3.10.0-1160.31.1.el7.ppc64.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-3.10.0-1160.31.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debug-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.31.1.el7.ppc64.rpm kernel-devel-3.10.0-1160.31.1.el7.ppc64.rpm kernel-headers-3.10.0-1160.31.1.el7.ppc64.rpm kernel-tools-3.10.0-1160.31.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-1160.31.1.el7.ppc64.rpm perf-3.10.0-1160.31.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm python-perf-3.10.0-1160.31.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
ppc64le: bpftool-3.10.0-1160.31.1.el7.ppc64le.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debug-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-devel-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-headers-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-tools-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-1160.31.1.el7.ppc64le.rpm perf-3.10.0-1160.31.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm python-perf-3.10.0-1160.31.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
s390x: bpftool-3.10.0-1160.31.1.el7.s390x.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm kernel-3.10.0-1160.31.1.el7.s390x.rpm kernel-debug-3.10.0-1160.31.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.s390x.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-1160.31.1.el7.s390x.rpm kernel-devel-3.10.0-1160.31.1.el7.s390x.rpm kernel-headers-3.10.0-1160.31.1.el7.s390x.rpm kernel-kdump-3.10.0-1160.31.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-1160.31.1.el7.s390x.rpm perf-3.10.0-1160.31.1.el7.s390x.rpm perf-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm python-perf-3.10.0-1160.31.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm
x86_64: bpftool-3.10.0-1160.31.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm perf-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: bpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.31.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-1160.31.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm
ppc64le: bpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-1160.31.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm
x86_64: bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: kernel-3.10.0-1160.31.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm
x86_64: bpftool-3.10.0-1160.31.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm perf-3.10.0-1160.31.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-3.10.0-1160.31.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: OpenShift Container Platform 4.7.0 security, bug fix, and enhancement update Advisory ID: RHSA-2020:5633-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2020:5633 Issue date: 2021-02-24 CVE Names: CVE-2018-10103 CVE-2018-10105 CVE-2018-14461 CVE-2018-14462 CVE-2018-14463 CVE-2018-14464 CVE-2018-14465 CVE-2018-14466 CVE-2018-14467 CVE-2018-14468 CVE-2018-14469 CVE-2018-14470 CVE-2018-14553 CVE-2018-14879 CVE-2018-14880 CVE-2018-14881 CVE-2018-14882 CVE-2018-16227 CVE-2018-16228 CVE-2018-16229 CVE-2018-16230 CVE-2018-16300 CVE-2018-16451 CVE-2018-16452 CVE-2018-20843 CVE-2019-3884 CVE-2019-5018 CVE-2019-6977 CVE-2019-6978 CVE-2019-8625 CVE-2019-8710 CVE-2019-8720 CVE-2019-8743 CVE-2019-8764 CVE-2019-8766 CVE-2019-8769 CVE-2019-8771 CVE-2019-8782 CVE-2019-8783 CVE-2019-8808 CVE-2019-8811 CVE-2019-8812 CVE-2019-8813 CVE-2019-8814 CVE-2019-8815 CVE-2019-8816 CVE-2019-8819 CVE-2019-8820 CVE-2019-8823 CVE-2019-8835 CVE-2019-8844 CVE-2019-8846 CVE-2019-9455 CVE-2019-9458 CVE-2019-11068 CVE-2019-12614 CVE-2019-13050 CVE-2019-13225 CVE-2019-13627 CVE-2019-14889 CVE-2019-15165 CVE-2019-15166 CVE-2019-15903 CVE-2019-15917 CVE-2019-15925 CVE-2019-16167 CVE-2019-16168 CVE-2019-16231 CVE-2019-16233 CVE-2019-16935 CVE-2019-17450 CVE-2019-17546 CVE-2019-18197 CVE-2019-18808 CVE-2019-18809 CVE-2019-19046 CVE-2019-19056 CVE-2019-19062 CVE-2019-19063 CVE-2019-19068 CVE-2019-19072 CVE-2019-19221 CVE-2019-19319 CVE-2019-19332 CVE-2019-19447 CVE-2019-19524 CVE-2019-19533 CVE-2019-19537 CVE-2019-19543 CVE-2019-19602 CVE-2019-19767 CVE-2019-19770 CVE-2019-19906 CVE-2019-19956 CVE-2019-20054 CVE-2019-20218 CVE-2019-20386 CVE-2019-20387 CVE-2019-20388 CVE-2019-20454 CVE-2019-20636 CVE-2019-20807 CVE-2019-20812 CVE-2019-20907 CVE-2019-20916 CVE-2020-0305 CVE-2020-0444 CVE-2020-1716 CVE-2020-1730 CVE-2020-1751 CVE-2020-1752 CVE-2020-1971 CVE-2020-2574 CVE-2020-2752 CVE-2020-2922 CVE-2020-3862 CVE-2020-3864 CVE-2020-3865 CVE-2020-3867 CVE-2020-3868 CVE-2020-3885 CVE-2020-3894 CVE-2020-3895 CVE-2020-3897 CVE-2020-3898 CVE-2020-3899 CVE-2020-3900 CVE-2020-3901 CVE-2020-3902 CVE-2020-6405 CVE-2020-7595 CVE-2020-7774 CVE-2020-8177 CVE-2020-8492 CVE-2020-8563 CVE-2020-8566 CVE-2020-8619 CVE-2020-8622 CVE-2020-8623 CVE-2020-8624 CVE-2020-8647 CVE-2020-8648 CVE-2020-8649 CVE-2020-9327 CVE-2020-9802 CVE-2020-9803 CVE-2020-9805 CVE-2020-9806 CVE-2020-9807 CVE-2020-9843 CVE-2020-9850 CVE-2020-9862 CVE-2020-9893 CVE-2020-9894 CVE-2020-9895 CVE-2020-9915 CVE-2020-9925 CVE-2020-10018 CVE-2020-10029 CVE-2020-10732 CVE-2020-10749 CVE-2020-10751 CVE-2020-10763 CVE-2020-10773 CVE-2020-10774 CVE-2020-10942 CVE-2020-11565 CVE-2020-11668 CVE-2020-11793 CVE-2020-12465 CVE-2020-12655 CVE-2020-12659 CVE-2020-12770 CVE-2020-12826 CVE-2020-13249 CVE-2020-13630 CVE-2020-13631 CVE-2020-13632 CVE-2020-14019 CVE-2020-14040 CVE-2020-14381 CVE-2020-14382 CVE-2020-14391 CVE-2020-14422 CVE-2020-15157 CVE-2020-15503 CVE-2020-15862 CVE-2020-15999 CVE-2020-16166 CVE-2020-24490 CVE-2020-24659 CVE-2020-25211 CVE-2020-25641 CVE-2020-25658 CVE-2020-25661 CVE-2020-25662 CVE-2020-25681 CVE-2020-25682 CVE-2020-25683 CVE-2020-25684 CVE-2020-25685 CVE-2020-25686 CVE-2020-25687 CVE-2020-25694 CVE-2020-25696 CVE-2020-26160 CVE-2020-27813 CVE-2020-27846 CVE-2020-28362 CVE-2020-29652 CVE-2021-2007 CVE-2021-3121 =====================================================================
- Summary:
Red Hat OpenShift Container Platform release 4.7.0 is now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.0. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHSA-2020:5634
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-x86_64
The image digest is sha256:d74b1cfa81f8c9cc23336aee72d8ae9c9905e62c4874b071317a078c316f8a70
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-s390x
The image digest is sha256:a68ca03d87496ddfea0ac26b82af77231583a58a7836b95de85efe5e390ad45d
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-ppc64le
The image digest is sha256:bc7b04e038c8ff3a33b827f4ee19aa79b26e14c359a7dcc1ced9f3b58e5f1ac6
All OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor.
Security Fix(es):
- 
crewjam/saml: authentication bypass in saml authentication (CVE-2020-27846) 
- 
golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652) 
- 
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121) 
- 
nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774) 
- 
kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider (CVE-2020-8563) 
- 
containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749) 
- 
heketi: gluster-block volume password details available in logs (CVE-2020-10763) 
- 
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040) 
- 
jwt-go: access restriction bypass vulnerability (CVE-2020-26160) 
- 
golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813) 
- 
golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For OpenShift Container Platform 4.7, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html
Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html.
- Bugs fixed (https://bugzilla.redhat.com/):
1620608 - Restoring deployment config with history leads to weird state
1752220 - [OVN] Network Policy fails to work when project label gets overwritten
1756096 - Local storage operator should implement must-gather spec
1756173 - /etc/udev/rules.d/66-azure-storage.rules missing from initramfs
1768255 - installer reports 100% complete but failing components
1770017 - Init containers restart when the exited container is removed from node. 
1775057 - [MSTR-485] Cluster is abnormal after etcd backup/restore when the backup is conducted during etcd encryption is migrating
1775444 - RFE: k8s cpu manager does not restrict /usr/bin/pod cpuset
1777038 - Cluster scaled beyond host subnet limits does not fire alert or cleanly report why it cannot scale
1777224 - InfraID in metadata.json and .openshift_install_state.json is not consistent when repeating create commands
1784298 - "Displaying with reduced resolution due to large dataset." would show under some conditions
1785399 - Under condition of heavy pod creation, creation fails with 'error reserving pod name ...: name is reserved"
1797766 - Resource Requirements" specDescriptor fields - CPU and Memory injects empty string YAML editor
1801089 - [OVN] Installation failed and monitoring pod not created due to some network error. 
1805025 - [OSP] Machine status doesn't become "Failed" when creating a machine with invalid image
1805639 - Machine status should be "Failed" when creating a machine with invalid machine configuration
1806000 - CRI-O failing with: error reserving ctr name
1806915 - openshift-service-ca: Some core components are in openshift.io/run-level 1 and are bypassing SCC, but should not be
1806917 - openshift-service-ca-operator: Some core components are in openshift.io/run-level 1 and are bypassing SCC, but should not be
1810438 - Installation logs are not gathered from OCP nodes
1812085 - kubernetes-networking-namespace-pods dashboard doesn't exist
1812412 - Monitoring Dashboard: on restricted cluster, query timed out in expression evaluation
1813012 - EtcdDiscoveryDomain no longer needed
1813949 - openshift-install doesn't use env variables for OS_* for some of API endpoints
1816812 - OpenShift test suites are not resilient to rate limited registries (like docker.io) and cannot control their dependencies for offline use
1819053 - loading OpenAPI spec for "v1beta1.metrics.k8s.io" failed with: OpenAPI spec does not exist
1819457 - Package Server is in 'Cannot update' status despite properly working
1820141 - [RFE] deploy qemu-quest-agent on the nodes
1822744 - OCS Installation CI test flaking
1824038 - Integration Tests: StaleElementReferenceError in OLM single-installmode scenario
1825892 - StorageClasses and PVs are not cleaned completely after running the csi verification tool
1826301 - Wrong NodeStatus reports in file-integrity scan when configuration error in aide.conf file
1829723 - User workload monitoring alerts fire out of the box
1832968 - oc adm catalog mirror does not mirror the index image itself
1833012 - Lower OVNKubernetes HTTP E/W performance compared with OpenShiftSDN
1833220 - CVE-2020-10749 containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters
1834995 - olmFull suite always fails once th suite is run on the same cluster
1836017 - vSphere UPI: Both Internal and External load balancers for kube-apiserver should use /readyz
1837953 - Replacing masters doesn't work for ovn-kubernetes 4.4
1838352 - OperatorExited, Pending marketplace-operator-... pod for several weeks
1838751 - [oVirt][Tracker] Re-enable skipped network tests
1839239 - csi-snapshot-controller flickers Degraded=True on etcd hiccups
1840759 - [aws-ebs-csi-driver] The volume created by aws ebs csi driver can not be deleted when the cluster is destroyed
1841039 - authentication-operator: Add e2e test for password grants to Keycloak being set as OIDC IdP
1841119 - Get rid of config patches and pass flags directly to kcm
1841175 - When an Install Plan gets deleted, OLM does not create a new one
1841381 - Issue with memoryMB validation
1841885 - oc adm catalog mirror command attempts to pull from registry.redhat.io when using --from-dir option
1844727 - Etcd container leaves grep and lsof zombie processes
1845387 - CVE-2020-10763 heketi: gluster-block volume password details available in logs
1847074 - Filter bar layout issues at some screen widths on search page
1848358 - CRDs with preserveUnknownFields:true don't reflect in status that they are non-structural
1849543 - [4.5]kubeletconfig's description will show multiple lines for finalizers when upgrade from 4.4.8->4.5
1851103 - Use of NetworkManager-wait-online.service in rhcos-growpart.service
1851203 - [GSS] [RFE] Need a simpler representation of capactiy breakdown in total usage and per project breakdown in OCS 4 dashboard
1851351 - OCP 4.4.9: EtcdMemberIPMigratorDegraded: rpc error: code = Canceled desc = grpc: the client connection is closing
1851693 - The oc apply should return errors instead of hanging there when failing to create the CRD
1852289 - Upgrade testsuite fails on ppc64le environment - Unsupported LoadBalancer service
1853115 - the restriction of --cloud option should be shown in help text. 
1853116 - --to option does not work with --credentials-requests flag. 
1853352 - [v2v][UI] Storage Class fields Should  Not be empty  in VM  disks view
1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
1854567 - "Installed Operators" list showing "duplicated" entries during installation
1855325 - [Feature:Prometheus][Conformance] Prometheus when installed on the cluster [Top Level] [Feature:Prometheus][Conformance] Prometheus when installed on the cluster should report telemetry if a cloud.openshift.com token is present
1855351 - Inconsistent Installer reactions to Ctrl-C during user input process
1855408 - OVN cluster unstable after running minimal scale test
1856351 - Build page should show metrics for when the build ran, not the last 30 minutes
1856354 - New APIServices missing from OpenAPI definitions
1857446 - ARO/Azure: excessive pod memory allocation causes node lockup
1857877 - Operator upgrades can delete existing CSV before completion
1858578 - [v2v] [ui] VM import RHV to CNV Target VM Name longer than 63 chars should not be allowed
1859174 - [IPI][OSP] Having errors from 4.3 to 4.6 about Security group rule already created
1860136 - default ingress does not propagate annotations to route object on update
1860322 - [OCPv4.5.2] after unexpected shutdown one of RHV Hypervisors, OCP worker nodes machine are marked as "Failed"
1860518 - unable to stop a crio pod
1861383 - Route with haproxy.router.openshift.io/timeout: 365d kills the ingress controller
1862430 - LSO: PV creation lock should not be acquired in a loop
1862489 - LSO autoprovisioning should exclude top level disks that are part of LVM volume group. 
1862608 - Virtual media does not work on hosts using BIOS, only UEFI
1862918 - [v2v] User should only select SRIOV network when importin vm with SRIOV network
1865743 - Some pods are stuck in ContainerCreating and some sdn pods are in CrashLoopBackOff
1865839 - rpm-ostree fails with "System transaction in progress" when moving to kernel-rt
1866043 - Configurable table column headers can be illegible
1866087 - Examining agones helm chart resources results in "Oh no!"
1866261 - Need to indicate the intentional behavior for Ansible in the create api help info
1866298 - [RHOCS Usability Study][Installation] Labeling the namespace should be a part of the installation flow or be clearer as a requirement
1866320 - [RHOCS Usability Study][Dashboard] Users were confused by Available Capacity and the Total Capacity
1866334 - [RHOCS Usability Study][Installation] On the Operator installation page, there’s no indication on which labels offer tooltip/help
1866340 - [RHOCS Usability Study][Dashboard] It was not clear why “No persistent storage alerts” was prominently displayed
1866343 - [RHOCS Usability Study][Dashboard] User wanted to know the time frame for Data Consumption, e.g I/O Operations
1866445 - kola --basic-qemu-scenarios scenario fail on ppc64le & s390x
1866482 - Few errors are seen when oc adm must-gather is run
1866605 - No metadata.generation set for build and buildconfig objects
1866873 - MCDDrainError "Drain failed on  , updates may be blocked" missing rendered node name
1866901 - Deployment strategy for BMO allows multiple pods to run at the same time
1866925 - openshift-install destroy cluster should fail quickly when provided with invalid credentials on Azure. 
1867165 - Cannot assign static address to baremetal install bootstrap vm
1867380 - When using webhooks in OCP 4.5 fails to rollout latest deploymentconfig
1867400 - [OCs 4.5]UI should not allow creation of second storagecluster of different mode in a single OCS
1867477 - HPA monitoring cpu utilization fails for deployments which have init containers
1867518 - [oc] oc should not print so many goroutines when ANY command fails
1867608 - ds/machine-config-daemon takes 100+ minutes to rollout on  250 node cluster
1867965 - OpenShift Console Deployment Edit overwrites deployment yaml
1868004 - opm index add appears to produce image with wrong registry server binary
1868065 - oc -o jsonpath prints possible warning / bug "Unable to decode server response into a Table"
1868104 - Baremetal actuator should not delete Machine objects
1868125 - opm index add is not creating an index with valid images when --permissive flag is added, the index is empty instead
1868384 - CLI does not save login credentials as expected when using the same username in multiple clusters
1868527 - OpenShift Storage using VMWare vSAN receives error "Failed to add disk 'scsi0:2'" when mounted pod is created on separate node
1868645 - After a disaster recovery pods a stuck in "NodeAffinity" state and not running
1868748 - ClusterProvisioningIP in baremetal platform has wrong JSON annotation
1868765 - [vsphere][ci] could not reserve an IP address: no available addresses
1868770 - catalogSource named "redhat-operators" deleted in a disconnected cluster
1868976 - Prometheus error opening query log file on EBS backed PVC
1869293 - The configmap name looks confusing in aide-ds pod logs
1869606 - crio's failing to delete a network namespace
1870337 - [sig-storage] Managed cluster should have no crashlooping recycler pods over four minutes
1870342 - [sig-scheduling] SchedulerPredicates [Serial] validates resource limits of pods that are allowed to run  [Conformance]
1870373 - Ingress Operator reports available when DNS fails to provision
1870467 - D/DC Part of Helm / Operator Backed should not have HPA
1870728 - openshift-install creates expired ignition files from stale .openshift_install_state.json
1870800 - [4.6] Managed Column not appearing on Pods Details page
1871170 - e2e tests are needed to validate the functionality of the etcdctl container
1872001 - EtcdDiscoveryDomain no longer needed
1872095 - content are expanded to the whole line when only one column in table on Resource Details page
1872124 - Could not choose device type as "disk" or "part" when create localvolumeset from web console
1872128 - Can't run container with hostPort on ipv6 cluster
1872166 - 'Silences' link redirects to unexpected 'Alerts' view after creating a silence in the Developer perspective
1872251 - [aws-ebs-csi-driver] Verify job in CI doesn't check for vendor dir sanity
1872786 - Rules in kube-apiserver.rules are taking too long and consuming too much memory for Prometheus to evaluate them
1872821 - [DOC] Typo in Ansible Operator Tutorial
1872907 - Fail to create CR from generated Helm Base Operator
1872923 - Click "Cancel" button on the "initialization-resource" creation form page should send users to the "Operator details" page instead of "Install Operator" page (previous page)
1873007 - [downstream] failed to read config when running the operator-sdk in the home path
1873030 - Subscriptions without any candidate operators should cause resolution to fail
1873043 - Bump to latest available 1.19.x k8s
1873114 - Nodes goes into NotReady state (VMware)
1873288 - Changing Cluster-Wide Pull Secret Does Not Trigger Updates In Kubelet Filesystem
1873305 - Failed to power on /inspect node when using Redfish protocol
1873326 - Accessibility - The symbols e.g checkmark in the overview page has no text description, label, or other accessible information
1873480 - Accessibility - No text description, alt text, label, or other accessible information associated with the help icon: “?” button/icon in Developer Console ->Navigation
1873556 - [Openstack] HTTP_PROXY setting for NetworkManager-resolv-prepender not working
1873593 - MCO fails to cope with ContainerRuntimeConfig thas has a name > 63 characters
1874057 - Pod stuck in CreateContainerError - error msg="container_linux.go:348: starting container process caused \"chdir to cwd (\\"/mount-point\\") set in config.json failed: permission denied\""
1874074 - [CNV] Windows 2019 Default Template Not Defaulting to Proper NIC/Storage Driver
1874192 - [RFE] "Create Backing Store" page doesn't allow to select already defined k8s secret as target bucket credentials when Google Cloud Storage is selected as a provider
1874240 - [vsphere] unable to deprovision - Runtime error list attached objects
1874248 - Include validation for vcenter host in the install-config
1874340 - vmware: NodeClockNotSynchronising alert is triggered in openshift cluster after upgrading form 4.4.16 to 4.5.6
1874583 - apiserver tries and fails to log an event when shutting down
1874584 - add retry for etcd errors in kube-apiserver
1874638 - Missing logging for nbctl daemon
1874736 - [downstream] no version info for the helm-operator
1874901 - add utm_source parameter to Red Hat Marketplace URLs for attribution
1874968 - Accessibility: The project selection drop down is a keyboard trap
1875247 - Dependency resolution error "found more than one head for channel" is unhelpful for users
1875516 - disabled scheduling is easy to miss in node page of OCP console
1875598 - machine status is Running for a master node which has been terminated from the console
1875806 - When creating a service of type "LoadBalancer" (Kuryr,OVN) communication through this loadbalancer failes after 2-5 minutes. 
1876166 - need to be able to disable kube-apiserver connectivity checks
1876469 - Invalid doc link on yaml template schema description
1876701 - podCount specDescriptor change doesn't take effect on operand details page
1876815 - Installer uses the environment variable OS_CLOUD for manifest generation despite explicit prompt
1876935 - AWS volume snapshot is not deleted after the cluster is destroyed
1877071 - vSphere IPI - Nameserver limits were exceeded, some nameservers have been omitted
1877105 - add redfish to enabled_bios_interfaces
1877116 - e2e aws calico tests fail with rpc error: code = ResourceExhausted
1877273 - [OVN] EgressIP cannot fail over to available nodes after one egressIP node shutdown
1877648 - [sriov]VF from allocatable and capacity of node is incorrect when the policy is only 'rootDevices'
1877681 - Manually created PV can not be used
1877693 - dnsrecords specify recordTTL as 30 but the value is null in AWS Route 53
1877740 - RHCOS unable to get ip address during first boot
1877812 - [ROKS] IBM cloud failed to terminate OSDs when upgraded between internal builds of OCS 4.5
1877919 - panic in multus-admission-controller
1877924 - Cannot set BIOS config using Redfish with Dell iDracs
1878022 - Met imagestreamimport error when import the whole image repository
1878086 - OCP 4.6+OCS 4.6(multiple SC) Internal Mode- UI should populate the default "Filesystem Name" instead of providing a textbox, & the name should be validated
1878301 - [4.6] [UI] Unschedulable used to always be displayed when Node is Ready status
1878701 - After deleting and recreating a VM with same name, the VM events contain the events from the old VM
1878766 - CPU consumption on nodes is higher than the CPU count of the node. 
1878772 - On the nodes there are up to 547 zombie processes caused by thanos and Prometheus. 
1878823 - "oc adm release mirror" generating incomplete imageContentSources when using "--to" and "--to-release-image"
1878845 - 4.5 to 4.6.rc.4 upgrade failure: authentication operator health check connection refused for multitenant mode
1878900 - Installer complains about not enough vcpu for the baremetal flavor where generic bm flavor is being used
1878953 - RBAC error shows when normal user access pvc upload page
1878956 - oc api-resources does not include API version
1878972 - oc adm release mirror removes the architecture information
1879013 - [RFE]Improve CD-ROM interface selection
1879056 - UI should allow to change or unset the evictionStrategy
1879057 - [CSI Certificate Test] Test failed for CSI certification tests for CSIdriver openshift-storage.rbd.csi.ceph.com with RWX enabled
1879094 - RHCOS dhcp kernel parameters not working as expected
1879099 - Extra reboot during 4.5 -> 4.6 upgrade
1879244 - Error adding container to network "ipvlan-host-local": "master" field is required
1879248 - OLM Cert Dir for Webhooks does not align SDK/Kubebuilder
1879282 - Update OLM references to point to the OLM's new doc site
1879283 - panic after nil pointer dereference in pkg/daemon/update.go
1879365 - Overlapping, divergent openshift-cluster-storage-operator manifests
1879419 - [RFE]Improve boot source description for 'Container' and ‘URL’
1879430 - openshift-object-counts quota is not dynamically updating as the resource is deleted. 
1879565 - IPv6 installation fails on node-valid-hostname
1879777 - Overlapping, divergent openshift-machine-api namespace manifests
1879878 - Messages flooded in thanos-querier pod- oauth-proxy container: Authorization header does not start with 'Basic', skipping basic authentication in Log message in thanos-querier pod the oauth-proxy
1879930 - Annotations shouldn't be removed during object reconciliation
1879976 - No other channel visible from console
1880068 - image pruner is not aware of image policy annotation, StatefulSets, etc. 
1880148 - dns daemonset rolls out slowly in large clusters
1880161 - Actuator Update calls should have fixed retry time
1880259 - additional network + OVN network installation failed
1880389 - Pipeline Runs with skipped Tasks incorrectly show Tasks as "Failed"
1880410 - Convert Pipeline Visualization node to SVG
1880417 - [vmware] Fail to boot with Secure Boot enabled, kernel lockdown denies iopl access to afterburn
1880443 - broken machine pool management on OpenStack
1880450 - Host failed to install because its installation stage joined took longer than expected 20m0s. 
1880473 - IBM Cloudpak operators installation stuck "UpgradePending" with InstallPlan status updates failing due to size limitation
1880680 - [4.3] [Tigera plugin] - openshift-kube-proxy fails - Failed to execute iptables-restore: exit status 4 (iptables-restore v1.8.4 (nf_tables)
1880785 - CredentialsRequest missing description in oc explain
1880787 - No description for Provisioning CRD for oc explain
1880902 - need dnsPlocy set in crd ingresscontrollers
1880913 - [DeScheduler] - change loglevel from Info to Error when priority class given in the descheduler params is not present in the cluster
1881027 - Cluster installation fails at with error :  the container name \"assisted-installer\" is already in use
1881046 - [OSP] openstack-cinder-csi-driver-operator doesn't contain required manifests and assets
1881155 - operator install authentication: Authentication require functional ingress which requires at least one schedulable and ready node
1881268 - Image uploading failed but wizard claim the source is available
1881322 - kube-scheduler not scheduling pods for certificates not renewed automatically after nodes restoration
1881347 - [v2v][ui]VM Import Wizard does not call Import provider cleanup
1881881 - unable to specify target port manually resulting in application not reachable
1881898 - misalignment of sub-title in quick start headers
1882022 - [vsphere][ipi] directory path is incomplete, terraform can't find the cluster
1882057 - Not able to select access modes for snapshot and clone
1882140 - No description for spec.kubeletConfig
1882176 - Master recovery instructions don't handle IP change well
1882191 - Installation fails against external resources which lack DNS Subject Alternative Name
1882209 - [ BateMetal IPI ] local coredns resolution not working
1882210 - [release 4.7] insights-operator: Fix bug in reflector not recovering from "Too large resource version"
1882268 - [e2e][automation]Add Integration Test for Snapshots
1882361 - Retrieve and expose the latest report for the cluster
1882485 - dns-node-resolver corrupts /etc/hosts if internal registry is not in use
1882556 - git:// protocol in origin tests is not currently proxied
1882569 - CNO: Replacing masters doesn't work for ovn-kubernetes 4.4
1882608 - Spot instance not getting created on AzureGovCloud
1882630 - Fstype is changed after deleting pv provisioned by localvolumeset instance
1882649 - IPI installer labels all images it uploads into glance as qcow2
1882653 - The Approval should display the Manual after the APPROVAL changed to Manual from the Automatic
1882658 - [RFE] Volume Snapshot is not listed under inventory in Project Details page
1882660 - Operators in a namespace should be installed together when approve one
1882667 - [ovn] br-ex Link not found when scale up RHEL worker
1882723 - [vsphere]Suggested mimimum value for providerspec not working
1882730 - z systems not reporting correct core count in recording rule
1882750 - [sig-api-machinery][Feature:APIServer][Late] kubelet terminates kube-apiserver gracefully
1882781 - nameserver= option to dracut creates extra NM connection profile
1882785 - Multi-Arch CI Jobs destroy libvirt network but occasionally leave it defined
1882844 - [IPI on vsphere] Executing 'openshift-installer destroy cluster' leaves installer tag categories in vsphere
1883371 - CVE-2020-26160 jwt-go: access restriction bypass vulnerability
1883388 - Bare Metal Hosts Details page doesn't show Mainitenance and Power On/Off status
1883422 - operator-sdk cleanup fail after installing operator with "run bundle" without installmode and og with ownnamespace
1883425 - Gather top installplans and their count
1883502 - Logging is broken due to mix of k8s.io/klog v1 and v2
1883523 - [sig-cli] oc adm must-gather runs successfully for audit logs [Suite:openshift/conformance/parallel]
1883538 - must gather report "cannot file manila/aws ebs/ovirt csi related namespaces and objects" error
1883560 - operator-registry image needs clean up in /tmp
1883563 - Creating duplicate namespace from create namespace modal breaks the UI
1883614 - [OCP 4.6] [UI] UI should not describe power cycle as "graceful"
1883642 - [sig-imageregistry][Feature:ImageTriggers][Serial] ImageStream admission TestImageStreamAdmitSpecUpdate
1883660 - e2e-metal-ipi CI job consistently failing on 4.4
1883765 - [user workload monitoring] improve latency of Thanos sidecar  when streaming read requests
1883766 - [e2e][automation] Adjust tests for UI changes
1883768 - [user workload monitoring] The Prometheus operator should discard invalid TLS configurations
1883773 - opm alpha bundle build fails on win10 home
1883790 - revert "force cert rotation every couple days for development" in 4.7
1883803 - node pull secret feature is not working as expected
1883836 - Jenkins imagestream ubi8 and nodejs12 update
1883847 - The UI does not show checkbox for enable encryption at rest for OCS
1883853 - go list -m all does not work
1883905 - race condition in opm index add --overwrite-latest
1883946 - Understand why trident CSI pods are getting deleted by OCP
1884035 - Pods are illegally transitioning back to pending
1884041 - e2e should provide error info when minimum number of pods aren't ready in kube-system namespace
1884131 - oauth-proxy repository should run tests
1884165 - Repos should be disabled in -firstboot.service before OS extensions are applied
1884221 - IO becomes unhealthy due to a file change
1884258 - Node network alerts should work on ratio rather than absolute values
1884270 - Git clone does not support SCP-style ssh locations
1884334 - CVO marks an upgrade as failed when an operator takes more than 20 minutes to rollout
1884435 - vsphere - loopback is randomly not being added to resolver
1884565 - oauth-proxy crashes on invalid usage
1884584 - Kuryr controller continuously restarting due to unable to clean up Network Policy
1884613 - Create Instance of Prometheus from operator returns blank page for non cluster-admin users
1884628 - ovs-configuration service fails when the external network is configured on a tagged vlan on top of a bond device on a baremetal IPI deployment
1884629 - Visusally impaired user using screen reader not able to select Admin/Developer console options in drop down menu. 
1884632 - Adding BYOK disk encryption through DES
1884654 - Utilization of a VMI is not populated
1884655 - KeyError on self._existing_vifs[port_id]
1884664 - Operator install page shows "installing..." instead of going to install status page
1884672 - Failed to inspect hardware. Reason: unable to start inspection: 'idrac'
1884691 - Installer blocks cloud-credential-operator manual mode on GCP and Azure
1884724 - Quick Start: Serverless quickstart doesn't match Operator install steps
1884739 - Node process segfaulted
1884824 - Update baremetal-operator libraries to k8s 1.19
1885002 - network kube-rbac-proxy scripts crashloop rather than non-crash looping
1885138 - Wrong detection of pending state in VM details
1885151 - [Cloud Team - Cluster API Provider Azure] Logging is broken due to mix of k8s.io/klog v1 and v2
1885165 - NoRunningOvnMaster alert falsely triggered
1885170 - Nil pointer when verifying images
1885173 - [e2e][automation] Add test for next run configuration feature
1885179 - oc image append fails on push (uploading a new layer)
1885213 - Vertical Pod Autoscaler (VPA) not working with DeploymentConfig
1885218 - [e2e][automation] Add virtctl to gating script
1885223 - Sync with upstream (fix panicking cluster-capacity binary)
1885235 - Prometheus: Logging is broken due to mix of k8s.io/klog v1 and v2
1885241 - kube-rbac-proxy: Logging is broken due to mix of k8s.io/klog v1 and v2
1885243 - prometheus-adapter: Logging is broken due to mix of k8s.io/klog v1 and v2
1885244 - prometheus-operator: Logging is broken due to mix of k8s.io/klog v1 and v2
1885246 - cluster-monitoring-operator: Logging is broken due to mix of k8s.io/klog v1 and v2
1885249 - openshift-state-metrics: Logging is broken due to mix of k8s.io/klog v1 and v2
1885308 - Supermicro nodes failed to boot via disk during installation when using IPMI and UEFI
1885315 - unit tests fail on slow disks
1885319 - Remove redundant use of group and kind of DataVolumeTemplate
1885343 - Console doesn't load in iOS Safari when using self-signed certificates
1885344 - 4.7 upgrade - dummy bug for 1880591
1885358 - add p&f configuration to protect openshift traffic
1885365 - MCO does not respect the install section of systemd files when enabling
1885376 - failed to initialize the cluster: Cluster operator marketplace is still updating
1885398 - CSV with only Webhook conversion can't be installed
1885403 - Some OLM events hide the underlying errors
1885414 - Need to disable HTX when not using HTTP/2 in order to preserve HTTP header name case
1885425 - opm index add cannot batch add multiple bundles that use skips
1885543 - node tuning operator builds and installs an unsigned RPM
1885644 - Panic output due to timeouts in openshift-apiserver
1885676 - [OCP 4.7]UI should fallback to minimal deployment only after total CPU < 30 || totalMemory < 72 GiB for initial deployment
1885702 - Cypress:  Fix 'aria-hidden-focus' accesibility violations
1885706 - Cypress:  Fix 'link-name' accesibility violation
1885761 - DNS fails to resolve in some pods
1885856 - Missing registry v1 protocol usage metric on telemetry
1885864 - Stalld service crashed under the worker node
1885930 - [release 4.7] Collect ServiceAccount statistics
1885940 - kuryr/demo image ping not working
1886007 - upgrade test with service type load balancer will never work
1886022 - Move range allocations to CRD's
1886028 - [BM][IPI] Failed to delete node after scale down
1886111 - UpdatingopenshiftStateMetricsFailed: DeploymentRollout of openshift-monitoring/openshift-state-metrics: got 1 unavailable replicas
1886134 - Need to set GODEBUG=x509ignoreCN=0 in initrd
1886154 - System roles are not present while trying to create new role binding through web console
1886166 - 1885517 Clone - Not needed for 4.7 - upgrade from 4.5->4.6 causes broadcast storm
1886168 - Remove Terminal Option for Windows Nodes
1886200 - greenwave / CVP is failing on bundle validations, cannot stage push
1886229 - Multipath support for RHCOS sysroot
1886294 - Unable to schedule a pod due to Insufficient ephemeral-storage
1886327 - Attempt to add a worker using bad roodDeviceHint: bmh and machine become Provisioned, no error in status
1886353 - [e2e][automation] kubevirt-gating job fails for a missing virtctl URL
1886397 - Move object-enum to console-shared
1886423 - New Affinities don't contain ID until saving
1886435 - Azure UPI uses deprecated command 'group deployment'
1886449 - p&f: add configuration to protect oauth server traffic
1886452 - layout options doesn't gets selected style on click i.e grey background
1886462 - IO doesn't recognize namespaces - 2 resources with the same name in 2 namespaces -> only 1 gets collected
1886488 - move e2e test off of nfs image from docker.io/gmontero/nfs-server:latest
1886524 - Change default terminal command for Windows Pods
1886553 - i/o timeout experienced from build02 when targeting CI test cluster during test execution
1886600 - panic: assignment to entry in nil map
1886620 - Application behind service load balancer with PDB is not disrupted
1886627 - Kube-apiserver pods restarting/reinitializing periodically
1886635 - CVE-2020-8563 kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider
1886636 - Panic in machine-config-operator
1886749 - Removing network policy from namespace causes inability to access pods through loadbalancer. 
1886751 - Gather MachineConfigPools
1886766 - PVC dropdown has 'Persistent Volume' Label
1886834 - ovn-cert is mandatory in both master and node daemonsets
1886848 - [OSP] machine instance-state annotation discrepancy with providerStatus.instanceState
1886861 - ordered-values.yaml not honored if values.schema.json provided
1886871 - Neutron ports created for hostNetworking pods
1886890 - Overwrite jenkins-agent-base imagestream
1886900 - Cluster-version operator fills logs with "Manifest: ..." spew
1886922 - [sig-network] pods should successfully create sandboxes by getting pod
1886973 - Local storage operator doesn't include correctly populate LocalVolumeDiscoveryResult in console
1886977 - [v2v]Incorrect VM Provider type displayed in UI while importing VMs through VMIO
1887010 - Imagepruner met error "Job has reached the specified backoff limit" which causes image registry degraded
1887026 - FC volume attach fails with “no fc disk found” error on OCP 4.6 PowerVM cluster
1887040 - [upgrade] ovs pod crash for rhel worker when upgarde from 4.5 to 4.6
1887046 - Event for LSO need update to avoid confusion
1887088 - cluster-node-tuning-operator refers to missing cluster-node-tuned image
1887375 - User should be able to specify volumeMode when creating pvc from web-console
1887380 - Unsupported access mode should not be available to select when creating pvc by aws-ebs-csi-driver(gp2-csi) from web-console
1887392 - openshift-apiserver: delegated authn/z should have ttl > metrics/healthz/readyz/openapi interval
1887428 - oauth-apiserver service should be monitored by prometheus
1887441 - ingress misconfiguration may break authentication but ingress operator keeps reporting "degraded: False"
1887454 - [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext4)] volumes should store data
1887456 - It is impossible to attach the default NIC to a bridge with the latest version of OVN Kubernetes
1887465 - Deleted project is still referenced
1887472 - unable to edit application group for KSVC via gestures (shift+Drag)
1887488 - OCP 4.6:  Topology Manager OpenShift E2E test fails:  gu workload attached to SRIOV networks should let resource-aligned PODs have working SRIOV network interface
1887509 - Openshift-tests conformance TopologyManager tests run when Machine Config Operator is not installed on cluster
1887525 - Failures to set master HardwareDetails cannot easily be debugged
1887545 - 4.5 to 4.6 upgrade fails when external network is configured on a bond device: ovs-configuration service fails and node becomes unreachable
1887585 - ovn-masters stuck in crashloop after scale test
1887651 - [Internal Mode] Object gateway (RGW) in unknown state after OCP upgrade. 
1887737 - Test TestImageRegistryRemovedWithImages is failing on e2e-vsphere-operator
1887740 - cannot install descheduler operator after uninstalling it
1887745 - API server is throwing 5xx error code for 42.11% of requests for LIST events
1887750 - oc explain localvolumediscovery returns empty description
1887751 - oc explain localvolumediscoveryresult returns empty description
1887778 - Add ContainerRuntimeConfig gatherer
1887783 - PVC upload cannot continue after approve the certificate
1887797 - [CNV][V2V] Default network type is bridge for interface bound to POD network in VMWare migration wizard
1887799 - User workload monitoring prometheus-config-reloader OOM
1887850 - [sig-auth][Feature:SCC][Early] should not have pod creation failures during install test is flaky
1887863 - Installer panics on invalid flavor
1887864 - Clean up dependencies to avoid invalid scan flagging
1887934 - TestForwardedHeaderPolicyAppend, TestForwardedHeaderPolicyReplace, and TestForwardedHeaderPolicyIfNone consistently fail because of case-sensitive comparison
1887936 - Kube-scheduler should be able to parse v1beta1 KubeSchedulerConfig
1888015 - workaround kubelet graceful termination of static pods bug
1888028 - prevent extra cycle in aggregated apiservers
1888036 - Operator details shows old CRD versions
1888041 - non-terminating pods are going from running to pending
1888072 - Setting Supermicro node to PXE boot via Redfish doesn't take affect
1888073 - Operator controller continuously busy looping
1888118 - Memory requests not specified for image registry operator
1888150 - Install Operand Form on OperatorHub is displaying unformatted text
1888172 - PR 209 didn't update the sample archive, but machineset and pdbs are now namespaced
1888227 - Failed to deploy some of container image on the recent OCP 4.6 nightly build
1888292 - Fix CVE-2015-7501 affecting agent-maven-3.5
1888311 - p&f: make SAR traffic from oauth and openshift apiserver exempt
1888363 - namespaces crash in dev
1888378 - [IPI on Azure] errors destroying cluster when Azure resource group was never created
1888381 - instance:node_network_receive_bytes_excluding_lo:rate1m value twice expected
1888464 - installer missing permission definitions for TagResources and UntagResources when installing in existing VPC
1888494 - imagepruner pod is error when image registry storage is not configured
1888565 - [OSP] machine-config-daemon-firstboot.service failed with "error reading osImageURL from rpm-ostree"
1888595 - cluster-policy-controller logs shows error which reads initial monitor sync has error
1888601 - The poddisruptionbudgets is using the operator service account, instead of gather
1888657 - oc doesn't know its name
1888663 - sdn starts after kube-apiserver, delay readyz until oauth-apiserver is reachable
1888671 - Document the Cloud Provider's ignore-volume-az setting
1888738 - quay.io/openshift/origin-must-gather:latest is not a multi-arch, manifest-list image
1888763 - at least one of these parameters (Vendor, DeviceID or PfNames) has to be defined in nicSelector in CR %s", cr.GetName()
1888827 - ovnkube-master may segfault when trying to add IPs to a nil address set
1888861 - need to pass dual-stack service CIDRs to kube-apiserver in dual-stack cluster
1888866 - AggregatedAPIDown permanently firing after removing APIService
1888870 - JS error when using autocomplete in YAML editor
1888874 - hover message are not shown for some properties
1888900 - align plugins versions
1888985 - Cypress:  Fix 'Ensures buttons have discernible text' accesibility violation
1889213 - The error message of uploading failure is not clear enough
1889267 - Increase the time out for creating template and upload image in the terraform
1889348 - Project link should be removed from Application Details page, since it is inaccurate (Application Stages)
1889374 - Kiali feature won't work on fresh 4.6 cluster
1889388 - ListBundles returns incorrect replaces/skips when bundles have been added via semver-skippatch mode
1889420 - OCP failed to add vsphere disk when pod moved to new node during cluster upgrade
1889515 - Accessibility - The symbols e.g checkmark in the Node > overview page has no text description, label, or other accessible information
1889529 - [Init-CR annotation] Inline alert shows operand instance was needed still appearing after creating an Operand instance
1889540 - [4.5 upgrade][alert]CloudCredentialOperatorDown
1889577 - Resources are not shown on project workloads page
1889620 - [Azure] - Machineset not scaling when publicIP:true in disconnected Azure enviroment
1889630 - Scheduling disabled popovers are missing for Node status in Node Overview and Details pages
1889692 - Selected Capacity is showing wrong size
1889694 - usbguard fails to install as RHCOS extension due to missing libprotobuf.so.15
1889698 - When the user clicked cancel at the Create Storage Class confirmation dialog all the data from the Local volume set goes off
1889710 - Prometheus metrics on disk take more space compared to OCP 4.5
1889721 - opm index add semver-skippatch mode does not respect prerelease versions
1889724 - When LocalVolumeDiscovery CR is created form the LSO page User doesn't see the Disk tab
1889767 - [vsphere] Remove certificate from upi-installer image
1889779 - error when destroying a vSphere installation that failed early
1889787 - OCP is flooding the oVirt engine with auth errors
1889838 - race in Operator update after fix from bz1888073
1889852 - support new AWS regions ap-east-1, af-south-1, eu-south-1
1889863 - Router prints incorrect log message for namespace label selector
1889891 - Backport timecache LRU fix
1889912 - Drains can cause high CPU usage
1889921 - Reported Degraded=False Available=False pair does not make sense
1889928 - [e2e][automation] Add more tests for golden os
1889943 - EgressNetworkPolicy does not work when setting Allow rule to a dnsName
1890038 - Infrastructure status.platform not migrated to status.platformStatus causes warnings
1890074 - MCO extension kernel-headers is invalid
1890104 - with Serverless 1.10 version of trigger/subscription/channel/IMC is V1 as latest
1890130 - multitenant mode consistently fails CI
1890141 - move off docker.io images for build/image-eco/templates/jenkins e2e
1890145 - The mismatched of font size for Status Ready and Health Check secondary text
1890180 - FieldDependency x-descriptor doesn't support non-sibling fields
1890182 - DaemonSet with existing owner garbage collected
1890228 - AWS: destroy stuck on route53 hosted zone not found
1890235 - e2e: update Protractor's checkErrors logging
1890250 - workers may fail to join the cluster during an update from 4.5
1890256 - Replacing a master node on a baremetal IPI deployment gets stuck when deleting the machine of the unhealthy member
1890270 - External IP doesn't work if the IP address is not assigned to a node
1890361 - s390x: Generate new ostree rpm with fix for rootfs immutability
1890456 - [vsphere] mapi_instance_create_failed doesn't work on vsphere
1890467 - unable to edit an application without a service
1890472 - [Kuryr] Bulk port creation exception not completely formatted
1890494 - Error assigning Egress IP on GCP
1890530 - cluster-policy-controller doesn't gracefully terminate
1890630 - [Kuryr] Available port count not correctly calculated for alerts
1890671 - [SA] verify-image-signature using service account does not work
1890677 - 'oc image info' claims 'does not exist' for application/vnd.oci.image.manifest.v1+json manifest
1890808 - New etcd alerts need to be added to the monitoring stack
1890951 - Mirror of multiarch images together with cluster logging case problems. It doesn't sync the "overall" sha it syncs only the sub arch sha. 
1890984 - Rename operator-webhook-config to sriov-operator-webhook-config
1890995 - wew-app should provide more insight into why image deployment failed
1891023 - ovn-kubernetes rbac proxy never starts waiting for an incorrect API call
1891047 - Helm chart fails to install using developer console because of TLS certificate error
1891068 - [sig-instrumentation] Prometheus when installed on the cluster shouldn't report any alerts in firing state apart from Watchdog and AlertmanagerReceiversNotConfigured [Early] failing due to TargetDown alert from kube-scheduler
1891080 - [LSO] When Localvolumeset and SC is already created before OCS install Creation of LVD and LVS is skipped when user click created storage cluster from UI
1891108 - p&f: Increase the concurrency share of workload-low priority level
1891143 - CVO deadlocked while shutting down, shortly after fresh cluster install (metrics goroutine)
1891189 - [LSO] max device limit is accepting negative values. PVC is not getting created and no error is shown
1891314 - Display incompatible helm charts for installation (kubeVersion of cluster doesn't meet requirements of chart)
1891362 - Wrong metrics count for openshift_build_result_total
1891368 - fync should be fsync for etcdHighFsyncDurations alert's annotations.message
1891374 - fync should be fsync for etcdHighFsyncDurations critical alert's annotations.message
1891376 - Extra text in Cluster Utilization charts
1891419 - Wrong detail head on network policy detail page. 
1891459 - Snapshot tests should report stderr of failed commands
1891498 - Other machine config pools do not show during update
1891543 - OpenShift 4.6/OSP install fails when node flavor has less than 25GB, even with dedicated storage
1891551 - Clusterautoscaler doesn't scale up as expected
1891552 - Handle missing labels as empty. 
1891555 - The windows oc.exe binary does not have version metadata
1891559 - kuryr-cni cannot start new thread
1891614 - [mlx] testpmd fails inside OpenShift pod using DevX version 19.11
1891625 - [Release 4.7] Mutable LoadBalancer Scope
1891702 - installer get pending when additionalTrustBundle is added into  install-config.yaml
1891716 - OVN cluster upgrade from 4.6.1 to 4.7 fails
1891740 - OperatorStatusChanged is noisy
1891758 - the authentication operator may spam DeploymentUpdated event endlessly
1891759 - Dockerfile builds cannot change /etc/pki/ca-trust
1891816 - [UPI] [OSP] control-plane.yml provisioning playbook fails on OSP 16.1
1891825 - Error message not very informative in case of mode mismatch
1891898 - The ClusterServiceVersion can define Webhooks that cannot be created. 
1891951 - UI should show warning while creating pools with compression on
1891952 - [Release 4.7] Apps Domain Enhancement
1891993 - 4.5 to 4.6 upgrade doesn't remove deployments created by marketplace
1891995 - OperatorHub displaying old content
1891999 - Storage efficiency card showing wrong compression ratio
1892004 - OCP 4.6 opm on Ubuntu 18.04.4 - error /lib/x86_64-linux-gnu/libc.so.6: version GLIBC_2.28' not found (required by ./opm)
1892167 - [SR-IOV] SriovNetworkNodePolicies apply ignoring the spec.nodeSelector. 
1892198 - TypeError in 'Performance Profile' tab displayed for 'Performance Addon Operator'
1892288 - assisted install workflow creates excessive control-plane disruption
1892338 - HAProxyReloadFail alert only briefly fires in the event of a broken HAProxy config
1892358 - [e2e][automation] update feature gate for kubevirt-gating job
1892376 - Deleted netnamespace could not be re-created
1892390 - TestOverwrite/OverwriteBundle/DefaultBehavior in operator-registry is flaky
1892393 - TestListPackages is flaky
1892448 - MCDPivotError alert/metric missing
1892457 - NTO-shipped stalld needs to use FIFO for boosting. 
1892467 - linuxptp-daemon crash
1892521 - [AWS] Startup bootstrap machine failed due to ignition file is missing in disconnected UPI env
1892653 - User is unable to create KafkaSource with v1beta
1892724 - VFS added to the list of devices of the nodeptpdevice CRD
1892799 - Mounting additionalTrustBundle in the operator
1893117 - Maintenance mode on vSphere blocks installation. 
1893351 - TLS secrets are not able to edit on console. 
1893362 - The ovs-xxxxx_openshift-sdn container does not terminate gracefully, slowing down reboots
1893386 - false-positive ReadyIngressNodes_NoReadyIngressNodes: Auth operator makes risky "worker" assumption when guessing about ingress availability
1893546 - Deploy using virtual media fails on node cleaning step
1893601 - overview filesystem utilization of OCP is showing the wrong values
1893645 - oc describe route SIGSEGV
1893648 - Ironic image building process is not compatible with UEFI secure boot
1893724 - OperatorHub generates incorrect RBAC
1893739 - Force deletion doesn't work for snapshots if snapshotclass is already deleted
1893776 - No useful metrics for image pull time available, making debugging issues there impossible
1893798 - Lots of error messages starting with "get namespace to enqueue Alertmanager instances failed" in the logs of prometheus-operator
1893832 - ErrorCount field is missing in baremetalhosts.metal3.io CRD
1893889 - disabled dropdown items in the pf dropdown component are skipped over and unannounced by JAWS
1893926 - Some "Dynamic PV (block volmode)" pattern storage e2e tests are wrongly skipped
1893944 - Wrong product name for Multicloud Object Gateway
1893953 - (release-4.7) Gather default StatefulSet configs
1893956 - Installation always fails at "failed to initialize the cluster: Cluster operator image-registry is still updating"
1893963 - [Testday] Workloads-> Virtualization is not loading for Firefox browser
1893972 - Should skip e2e test cases as early as possible
1894013 - [v2v][Testday] VMware to CNV VM import]VMware URL: It is not clear that only the FQDN/IP address is required without 'https://'
1894020 - User with edit users cannot deploy images from their own namespace from the developer perspective
1894025 - OCP 4.5 to 4.6 upgrade for "aws-ebs-csi-driver-operator" fails when "defaultNodeSelector" is set
1894041 - [v2v][[Testday]VM import from VMware/RHV] VM import wizard: The target storage class name is not displayed if default storage class is used. 
1894065 - tag new packages to enable TLS support
1894110 - Console shows wrong value for maxUnavailable and maxSurge when set to 0
1894144 - CI runs of baremetal IPI are failing due to newer libvirt libraries
1894146 - ironic-api used by metal3 is over provisioned and consumes a lot of RAM
1894194 - KuryrPorts leftovers from 4.6 GA need to be deleted
1894210 - Failed to encrypt OSDs on OCS4.6 installation (via UI)
1894216 - Improve OpenShift Web Console availability
1894275 - Fix CRO owners file to reflect node owner
1894278 - "database is locked" error when adding bundle to index image
1894330 - upgrade channels needs to be updated for 4.7
1894342 - oauth-apiserver logs many "[SHOULD NOT HAPPEN] failed to update managedFields for ... OAuthClient ... no corresponding type for oauth.openshift.io/v1, Kind=OAuthClient"
1894374 - Dont prevent the user from uploading a file with incorrect extension
1894432 - [oVirt] sometimes installer timeout on tmp_import_vm
1894477 - bash syntax error in nodeip-configuration.service
1894503 - add automated test for Polarion CNV-5045
1894519 - [OSP] External mode cluster creation disabled for Openstack and oVirt platform
1894539 - [on-prem] Unable to deploy additional machinesets on separate subnets
1894645 - Cinder volume provisioning crashes on nil cloud provider
1894677 - image-pruner job is panicking: klog stack
1894810 - Remove TechPreview Badge from Eventing in Serverless version 1.11.0
1894860 - 'backend' CI job passing despite failing tests
1894910 - Update the node to use the real-time kernel fails
1894992 - All nightly jobs for e2e-metal-ipi failing due to ipa image missing tenacity package
1895065 - Schema / Samples / Snippets Tabs are all selected at the same time
1895099 - vsphere-upi and vsphere-upi-serial jobs time out waiting for bootstrap to complete in CI
1895141 - panic in service-ca injector
1895147 - Remove memory limits on openshift-dns
1895169 - VM Template does not properly manage Mount Windows guest tools check box during VM creation
1895268 - The bundleAPIs should NOT be empty
1895309 - [OCP v47] The RHEL node scaleup fails due to "No package matching 'cri-o-1.19.*' found available" on OCP 4.7 cluster
1895329 - The infra index filled with warnings "WARNING: kubernetes.io/cinder built-in volume provider is now deprecated. The Cinder volume provider is deprecated and will be removed in a future release"
1895360 - Machine Config Daemon removes a file although its defined in the dropin
1895367 - Missing image in metadata DB index.db in disconnected Operator Hub installation. OCP 4.6.1
1895372 - Web console going blank after selecting any operator to install from OperatorHub
1895385 - Revert KUBELET_LOG_LEVEL back to level 3
1895423 - unable to edit an application with a custom builder image
1895430 - unable to edit custom template application
1895509 - Backup taken on one master cannot be restored on other masters
1895537 - [sig-imageregistry][Feature:ImageExtract] Image extract should extract content from an image
1895838 - oc explain description contains '/'
1895908 - "virtio" option is not available when modifying a CD-ROM to disk type
1895909 - e2e-metal-ipi-ovn-dualstack is failing
1895919 - NTO fails to load kernel modules
1895959 - configuring webhook token authentication should prevent cluster upgrades
1895979 - Unable to get coreos-installer with --copy-network to work
1896101 - [cnv][automation] Added negative tests for migration from VMWare and RHV
1896160 - CI: Some cluster operators are not ready: marketplace (missing: Degraded)
1896188 - [sig-cli] oc debug deployment configs from a build: local-busybox-1-build not completed
1896218 - Occasional GCP install failures: Error setting IAM policy for project ...: googleapi: Error 400: Service account ... does not exist., badRequest
1896229 - Current Rate of Bytes Received and Current Rate of Bytes Transmitted data can not be loaded
1896244 - Found a panic in storage e2e test
1896296 - Git links should avoid .git as part of the URL and should not link git:// urls in general
1896302 - [e2e][automation] Fix 4.6 test failures
1896365 - [Migration]The SDN migration cannot revert under some conditions
1896384 - [ovirt IPI]: local coredns resolution not working
1896446 - Git clone from private repository fails after upgrade OCP 4.5 to 4.6
1896529 - Incorrect instructions in the Serverless operator and application quick starts
1896645 - documentationBaseURL needs to be updated for 4.7
1896697 - [Descheduler] policy.yaml param in cluster configmap is empty
1896704 - Machine API components should honour cluster wide proxy settings
1896732 - "Attach to Virtual Machine OS" button should not be visible on old clusters
1896866 - File /etc/NetworkManager/system-connections/default_connection.nmconnection  is incompatible with SR-IOV operator
1896898 - ovs-configuration.service fails when multiple IPv6 default routes are provided via RAs over the same interface and deployment bootstrap fails
1896918 - start creating new-style Secrets for AWS
1896923 - DNS pod /metrics exposed on anonymous http port
1896977 - route SimpleAllocationPlugin: host name validation errors: spec.host: Invalid value: ... must be no more than 63 characters
1897003 - VNC console cannot be connected after visit it in new window
1897008 - Cypress: reenable check for 'aria-hidden-focus' rule & checkA11y test for modals
1897026 - [Migration] With updating optional network operator configuration, migration stucks on MCO
1897039 - router pod keeps printing log: template "msg"="router reloaded"  "output"="[WARNING] 316/065823 (15) : parsing [/var/lib/haproxy/conf/haproxy.config:52]: option 'http-use-htx' is deprecated and ignored
1897050 - [IBM Power] LocalVolumeSet provisions boot partition as PV. 
1897073 - [OCP 4.5] wrong netid assigned to Openshift projects/namespaces
1897138 - oVirt provider uses depricated cluster-api project
1897142 - When scaling replicas to zero, Octavia loadbalancer pool members are not updated accordingly
1897252 - Firing alerts are not showing up in console UI after cluster is up for some time
1897354 - Operator installation showing success, but Provided APIs are missing
1897361 - The MCO GCP-OP tests fail consistently on containerruntime tests with "connection refused"
1897412 - [sriov]disableDrain did not be updated in CRD of manifest
1897423 - Max unavailable and Max surge value are not shown on Deployment Config Details page
1897516 - Baremetal IPI deployment with IPv6 control plane fails when the nodes obtain both SLAAC and DHCPv6 addresses as they set their hostname to 'localhost'
1897520 - After restarting nodes the image-registry co is in degraded true state. 
1897584 - Add casc plugins
1897603 - Cinder volume attachment detection failure in Kubelet
1897604 - Machine API deployment fails: Kube-Controller-Manager can't reach API: "Unauthorized"
1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers
1897641 - Baremetal IPI with IPv6 control plane: nodes respond with duplicate packets to ICMP6 echo requests
1897676 - [CI] [Azure] [UPI] CI failing since 4.6 changes in ignition
1897830 - [GSS] Unable to deploy OCS 4.5.2 on OCP 4.6.1, cannotCreate OCS Cluster Service1897891 - [RFE][v2v][UI][CNV VM import] Providing error message or/and block migration when vddk-init-image is missing
1897897 - ptp lose sync openshift 4.6
1898036 - no network after reboot (IPI)
1898045 - AWS EBS CSI Driver can not get updated cloud credential secret automatically
1898097 - mDNS floods the baremetal network
1898118 - Lack of logs on some image stream tests make hard to find root cause of a problem
1898134 - Descheduler logs show absolute values instead of percentage when LowNodeUtilization strategy is applied
1898159 - kcm operator shall pass --allocate-node-cidrs=false to kcm for ovn-kube and openshift-sdn cluster
1898174 - [OVN] EgressIP does not guard against node IP assignment
1898194 - GCP: can't install on custom machine types
1898238 - Installer validations allow same floating IP for API and Ingress
1898268 - [OVN]:make checkbroken on 4.6
1898289 - E2E test: Use KUBEADM_PASSWORD_FILE by default
1898320 - Incorrect Apostrophe  Translation of  "it's" in Scheduling Disabled Popover
1898357 - Within the operatorhub details view, long unbroken text strings do not wrap cause breaking display. 
1898407 - [Deployment timing regression] Deployment takes longer with 4.7
1898417 - GCP: the dns targets in Google Cloud DNS is not updated after recreating loadbalancer service
1898487 - [oVirt] Node is not removed when VM has been removed from oVirt engine
1898500 - Failure to upgrade operator when a Service is included in a Bundle
1898517 - Ironic auto-discovery may result in rogue nodes registered in ironic
1898532 - Display names defined in specDescriptors not respected
1898580 - When adding more than one node selector to the sriovnetworknodepolicy, the cni and the device plugin pods are constantly rebooted
1898613 - Whereabouts should exclude IPv6 ranges
1898655 - [oVirt] Node deleted in oVirt should cause the Machine to go into a Failed phase
1898679 - Operand creation form - Required "type: object" properties (Accordion component) are missing red asterisk
1898680 - CVE-2020-7774 nodejs-y18n: prototype pollution vulnerability
1898745 - installation failing with CVO reporting openshift-samples not rolled out, samples not setting versions in its ClusterOperator
1898839 - Wrong YAML in operator metadata
1898851 - Multiple Pods access the same volume on the same node e2e test cases are missed from aws ebs csi driver e2e test job
1898873 - Remove TechPreview Badge from Monitoring
1898954 - Backup script does not take /etc/kubernetes/static-pod-resources on a reliable way
1899111 - [RFE] Update jenkins-maven-agen to maven36
1899128 - VMI details screen -> show the warning that it is preferable to have a VM only if the VM actually does not exist
1899175 - bump the RHCOS boot images for 4.7
1899198 - Use new packages for ipa ramdisks
1899200 - In Installed Operators page I cannot search for an Operator by it's name
1899220 - Support AWS IMDSv2
1899350 - configure-ovs.sh doesn't configure bonding options
1899433 - When Creating OCS from ocs wizard Step Discover Disks shows Error "An error occurred Not Found"
1899459 - Failed to start monitoring pods once the operator removed from override list of CVO
1899515 - Passthrough credentials are not immediately re-distributed on update
1899575 - update discovery burst to reflect lots of CRDs on openshift clusters
1899582 - update discovery burst to reflect lots of CRDs on openshift clusters
1899588 - Operator objects are re-created after all other associated resources have been deleted
1899600 - Increased etcd fsync latency as of OCP 4.6
1899603 - workers-rhel7 CI jobs failing: Failed to remove rollback: error running rpm-ostree cleanup
1899627 - Project dashboard Active status using small icon
1899725 - Pods table does not wrap well with quick start sidebar open
1899746 - [ovn] error while waiting on flows for pod: OVS sandbox port is no longer active (probably due to a subsequent CNI ADD)
1899760 - etcd_request_duration_seconds_bucket metric has excessive cardinality
1899835 - catalog-operator repeatedly crashes with "runtime error: index out of range [0] with length 0"
1899839 - thanosRuler.resources.requests does not take effect in user-workload-monitoring-config confimap
1899853 - additionalSecurityGroupIDs not working for master nodes
1899922 - NP changes sometimes influence new pods. 
1899949 - [Platform] Remove restriction on disk type selection for LocalVolumeSet
1900008 - Fix internationalized sentence fragments in ImageSearch.tsx
1900010 - Fix internationalized sentence fragments in BuildImageSelector.tsx
1900020 - Remove ' from internationalized keys
1900022 - Search Page - Top labels field is not applied to selected Pipeline resources
1900030 - disruption_tests: [sig-imageregistry] Image registry remain available failing consistently
1900126 - Creating a VM results in suggestion to create a default storage class when one already exists
1900138 - [OCP on RHV] Remove insecure mode from the installer
1900196 - stalld is not restarted after crash
1900239 - Skip "subPath should be able to unmount" NFS test
1900322 - metal3 pod's toleration for key: node-role.kubernetes.io/master currently matches on exact value matches but should match on Exists
1900377 - [e2e][automation] create new css selector for active users
1900496 - (release-4.7) Collect spec config for clusteroperator resources
1900672 - (s390x) Upgrade from old LUKS to new not working with DASD disks
1900699 - Impossible to add new Node on OCP 4.6 using large ECKD disks - fdasd issue
1900759 - include qemu-guest-agent by default
1900790 - Track all resource counts via telemetry
1900835 - Multus errors when cachefile is not found
1900935 -oc adm release mirrorpanic panic: runtime error
1900989 - accessing the route cannot wake up the idled resources
1901040 - When scaling down the status of the node is stuck on deleting
1901057 - authentication operator health check failed when installing a cluster behind proxy
1901107 - pod donut shows incorrect information
1901111 - Installer dependencies are broken
1901200 - linuxptp-daemon crash when enable debug log level
1901301 - CBO should handle platform=BM without provisioning CR
1901355 - [Azure][4.7] Invalid vm size from customized compute nodes does not fail properly
1901363 - High Podready Latency due to timed out waiting for annotations
1901373 - redundant bracket on snapshot restore button
1901376 - [on-prem] Upgrade from 4.6 to 4.7 failed with "timed out waiting for the condition during waitForControllerConfigToBeCompleted: controllerconfig is not completed: ControllerConfig has not completed: completed(false) running(false) failing(true"
1901395 - "Edit virtual machine template" action link should be removed
1901472 - [OSP] Bootstrap and master nodes use different keepalived unicast setting
1901517 - RHCOS 4.6.1 uses a single NetworkManager connection for multiple NICs when using default DHCP
1901531 - Console returns a blank page while trying to create an operator Custom CR with Invalid Schema
1901594 - Kubernetes resource CRUD operations.Kubernetes resource CRUD operations Pod "before all" hook for "creates the resource instance"
1901604 - CNO blocks editing Kuryr options
1901675 - [sig-network] multicast when using one of the plugins 'redhat/openshift-ovs-multitenant, redhat/openshift-ovs-networkpolicy' should allow multicast traffic in namespaces where it is enabled
1901909 - The device plugin pods / cni pod are restarted every 5 minutes
1901982 - [sig-builds][Feature:Builds] build can reference a cluster service  with a build being created from new-build should be able to run a build that references a cluster service
1902019 - when podTopologySpreadConstraint strategy is enabled for descheduler it throws error
1902059 - Wire a real signer for service accout issuer
1902091 -cluster-image-registry-operatorpod leaves connections open when fails connecting S3 storage
1902111 - CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service
1902157 - The DaemonSet machine-api-termination-handler couldn't allocate Pod
1902253 - MHC status doesnt set RemediationsAllowed = 0
1902299 - Failed to mirror operator catalog - error: destination registry required
1902545 - Cinder csi driver node pod should add nodeSelector for Linux
1902546 - Cinder csi driver node pod doesn't run on master node
1902547 - Cinder csi driver controller pod doesn't run on master node
1902552 - Cinder csi driver does not use the downstream images
1902595 - Project workloads list view doesn't show alert icon and hover message
1902600 - Container csi-snapshotter in Cinder csi driver needs to use ImagePullPolicy=IfNotPresent
1902601 - Cinder csi driver pods run as BestEffort qosClass
1902653 - [BM][IPI] Master deployment failed: No valid host was found. Reason: No conductor service registered which supports driver redfish for conductor group
1902702 - [sig-auth][Feature:LDAP][Serial] ldap group sync can sync groups from ldap: oc cp over non-existing directory/file fails
1902746 - [BM][IP] Master deployment failed - Base.1.0.GeneralError: database is locked
1902824 - failed to generate semver informed package manifest: unable to determine default channel
1902894 - hybrid-overlay-node crashing trying to get node object during initialization
1902969 - Cannot load vmi detail page
1902981 - It should default to current namespace when create vm from template
1902996 - [AWS] UPI on USGov, bootstrap machine can not fetch ignition file  via s3:// URI
1903033 - duplicated lines of imageContentSources is seen when mirror release image to local registry
1903034 - OLM continuously printing debug logs
1903062 - [Cinder csi driver] Deployment mounted volume have no write access
1903078 - Deleting VolumeSnapshotClass makes VolumeSnapshot not Ready
1903107 - Enable vsphere-problem-detector e2e tests
1903164 - OpenShift YAML editor jumps to top every few seconds
1903165 - Improve Canary Status Condition handling for e2e tests
1903172 - Column Management: Fix sticky footer on scroll
1903186 - [Descheduler] cluster logs should report some info when PodTopologySpreadConstraints strategy is enabled
1903188 - [Descheduler] cluster log reports failed to validate server configuration" err="unsupported log format:
1903192 - Role name missing on create role binding form
1903196 - Popover positioning is misaligned for Overview Dashboard status items
1903206 - Ingress controller incorrectly routes traffic to non-ready pods/backends. 
1903226 - MutatingWebhookConfiguration pod-identity-webhook does not exclude critical control-plane components
1903248 - Backport Upstream Static Pod UID patch
1903277 - Deprovisioning Not Deleting Security Groups [VpcLimitExceeded on e2e-aws tests]
1903290 - Kubelet repeatedly log the same log line from exited containers
1903346 - PV backed by FC lun is not being unmounted properly and this leads to IO errors / xfs corruption. 
1903382 - Panic when task-graph is canceled with a TaskNode with no tasks
1903400 - Migrate a VM which is not running goes to pending state
1903402 - Nic/Disk on VMI overview should link to VMI's nic/disk page
1903414 - NodePort is not working when configuring an egress IP address
1903424 - mapi_machine_phase_transition_seconds_sum doesn't work
1903464 - "Evaluating rule failed" for "record: cluster:kube_persistentvolumeclaim_resource_requests_storage_bytes:provisioner:sum" and "record: cluster:kubelet_volume_stats_used_bytes:provisioner:sum"
1903639 - Hostsubnet gatherer produces wrong output
1903651 - Network Policies are not working as expected with OVN-Kubernetes when traffic hairpins back to the same source through a service
1903660 - Cannot install with Assisted Installer on top of IPv6 since network provider is not started
1903674 - [sig-apps] ReplicationController should serve a basic image on each replica with a private image
1903717 - Handle different Pod selectors for metal3 Deployment
1903733 - Scale up followed by scale down can delete all running workers
1903917 - Failed to load "Developer Catalog" page
1903999 - Httplog response code is always zero
1904026 - The quota controllers should resync on new resources and make progress
1904064 - Automated cleaning is disabled by default
1904124 - DHCP to static lease script doesn't work correctly if starting with infinite leases
1904125 - Boostrap VM .ign image gets added into 'default' pool instead of <cluster-name>-<id>-bootstrap
1904131 - kuryr tempest plugin test test_ipblock_network_policy_sg_rules fails
1904133 - KubeletConfig flooded with failure conditions
1904161 - AlertmanagerReceiversNotConfigured fires unconditionally on alertmanager restart
1904243 - RHCOS 4.6.1 missing ISCSI initiatorname.iscsi !
1904244 - MissingKey errors for two plugins using i18next.t
1904262 - clusterresourceoverride-operator has version: 1.0.0 every build
1904296 - VPA-operator has version: 1.0.0 every build
1904297 - The index image generated by "opm index prune" leaves unrelated images
1904305 - Should have scroll-down bar for the field which the values list has too many results under dashboards
1904385 - [oVirt] registry cannot mount volume on 4.6.4 -> 4.6.6 upgrade
1904497 - vsphere-problem-detector: Run on vSphere cloud only
1904501 - [Descheduler] descheduler does not evict any pod when PodTopologySpreadConstraint strategy is set
1904502 - vsphere-problem-detector: allow longer timeouts for some operations
1904503 - vsphere-problem-detector: emit alerts
1904538 - [sig-arch][Early] Managed cluster should start all core operators: monitoring: container has runAsNonRoot and image has non-numeric user (nobody)
1904578 - metric scraping for vsphere problem detector is not configured
1904582 - All application traffic broken due to unexpected load balancer change on 4.6.4 -> 4.6.6 upgrade
1904663 - IPI pointer customization MachineConfig always generated
1904679 - [Feature:ImageInfo] Image info should display information about images
1904683 -[sig-builds][Feature:Builds] s2i build with a root user imagetests use docker.io image
1904684 - [sig-cli] oc debug ensure it works with image streams
1904713 - Helm charts with kubeVersion restriction are filtered incorrectly
1904776 - Snapshot modal alert is not pluralized
1904824 - Set vSphere hostname from guestinfo before NM starts
1904941 - Insights status is always showing a loading icon
1904973 - KeyError: 'nodeName' on NP deletion
1904985 - Prometheus and thanos sidecar targets are down
1904993 - Many ampersand special characters are found in strings
1905066 - QE - Monitoring test cases - smoke test suite automation
1905074 - QE -Gherkin linter to maintain standards
1905100 - Too many haproxy processes in default-router pod causing high load average
1905104 - Snapshot modal disk items missing keys
1905115 - CI: dev-scripts fail on 02_configure_host: Failed to start network ostestbm
1905119 - Race in AWS EBS determining whether custom CA bundle is used
1905128 - [e2e][automation] e2e tests succeed without actually execute
1905133 - operator conditions special-resource-operator
1905141 - vsphere-problem-detector: report metrics through telemetry
1905146 - Backend Tests: TestHelmRepoGetter_SkipDisabled failures
1905194 - Detecting broken connections to the Kube API takes up to 15 minutes
1905221 - CVO transitions from "Initializing" to "Updating" despite not attempting many manifests
1905232 - [sig-imageregistry][Feature:ImageAppend] Image append should create images by appending them failing due to inconsistent images between CI and OCP
1905253 - Inaccurate text at bottom of Events page
1905298 - openshift-apiserver initContainer fix-audit-permissions is not requesting required resources: cpu, memory
1905299 - OLM fails to update operator
1905307 - Provisioning CR is missing from must-gather
1905319 - cluster-samples-operator containers are not requesting required memory resource
1905320 - csi-snapshot-webhook is not requesting required memory resource
1905323 - dns-operator is not requesting required memory resource
1905324 - ingress-operator is not requesting required memory resource
1905327 - openshift-kube-scheduler initContainer wait-for-host-port is not requesting required resources: cpu, memory
1905328 - Changing the bound token service account issuer invalids previously issued bound tokens
1905329 - openshift-oauth-apiserver initContainer fix-audit-permissions is not requesting required resources: cpu, memory
1905330 - openshift-monitoring init-textfile is not requesting required resources: cpu, memory
1905338 - QE -Cypress Automation for Add Flow - Database, Yaml, OperatorBacked, PageDetails
1905347 - QE - Design Gherkin Scenarios
1905348 - QE - Design Gherkin Scenarios
1905362 - [sriov] Error message 'Fail to update DaemonSet' always shown in sriov operator pod
1905368 - [sriov] net-attach-def generated from sriovnetwork cannot be restored once it was deleted
1905370 - A-Z/Z-A sorting dropdown on Developer Catalog page is not aligned with filter text input
1905380 - Default to Red Hat/KubeVirt provider if common template does not have provider annotation
1905393 - CMO uses rbac.authorization.k8s.io/v1beta1 instead of rbac.authorization.k8s.io/v1
1905404 - The example of "Remove the entrypoint on the mysql:latest image" foroc image appenddoes not work
1905416 - Hyperlink not working from Operator Description
1905430 - usbguard extension fails to install because of missing correct protobuf dependency version
1905492 - The stalld service has a higher scheduler priority than ksoftirq and rcu{b, c} threads
1905502 - Test flake - unable to get https transport for ephemeral-registry
1905542 - [GSS] The "External" mode option is not available when the OCP cluster is deployed using Redhat Cluster Assisted Installer 4.6. 
1905599 - Errant change to lastupdatetime in copied CSV status can trigger runaway csv syncs
1905610 - Fix typo in export script
1905621 - Protractor login test fails against a 4.7 (nightly) Power cluster
1905640 - Subscription manual approval test is flaky
1905647 - Report physical core valid-for-subscription min/max/cumulative use to telemetry
1905696 - ClusterMoreUpdatesModal component did not get internationalized
1905748 - with sharded ingresscontrollers, all shards reload when any endpoint changes
1905761 - NetworkPolicy with Egress policyType is resulting in SDN errors and improper communication within Project
1905778 - inconsistent ingresscontroller between fresh installed cluster and upgraded cluster
1905792 - [OVN]Cannot create egressfirewalll with dnsName
1905889 - Should create SA for each namespace that the operator scoped
1905920 - Quickstart exit and restart
1905941 - Page goes to error after create catalogsource
1905977 - QE ghaekin design scenaio-pipeline metrics ODC-3711
1906032 - Canary Controller: Canary daemonset rolls out slowly in large clusters
1906100 - Disconnected cluster upgrades are failing from the cli, when signature retrieval is being blackholed instead of quickly rejected
1906105 - CBO annotates an existing Metal3 deployment resource to indicate that it is managing it
1906118 - OCS feature detection constantly polls storageclusters and storageclasses
1906120 - 'Create Role Binding' form not setting user or group value when created from a user or group resource
1906121 - [oc] After new-project creation, the kubeconfig file does not set the project
1906134 - OLM should not create OperatorConditions for copied CSVs
1906143 - CBO supports log levels
1906186 - i18n: Translators are not able to translatethiswithout context for alert manager config
1906228 - tuned and openshift-tuned sometimes do not terminate gracefully, slowing reboots
1906274 - StorageClass installed by Cinder csi driver operator should enable the allowVolumeExpansion to support volume resize. 
1906276 -oc image appendcan't work with multi-arch image with  --filter-by-os='.*'
1906318 - use proper term for Authorized SSH Keys
1906335 - The lastTransitionTime, message, reason field of operatorcondition should be optional
1906356 - Unify Clone PVC boot source flow with URL/Container boot source
1906397 - IPA has incorrect kernel command line arguments
1906441 - HorizontalNav and NavBar have invalid keys
1906448 - Deploy using virtualmedia with provisioning network disabled fails - 'Failed to connect to the agent' in ironic-conductor log
1906459 - openstack: Quota Validation fails if unlimited quotas are given to a project
1906496 - [BUG] Thanos having possible memory leak consuming huge amounts of node's memory and killing them
1906508 - TestHeaderNameCaseAdjust outputs nil error message on some failures
1906511 - Root reprovisioning tests flaking often in CI
1906517 - Validation is not robust enough and may prevent to generate install-confing. 
1906518 - Update snapshot API CRDs to v1
1906519 - Update LSO CRDs to use v1
1906570 - Number of disruptions caused by reboots on a cluster cannot be measured
1906588 - [ci][sig-builds] nodes is forbidden: User "e2e-test-jenkins-pipeline-xfghs-user" cannot list resource "nodes" in API group "" at the cluster scope
1906650 - Cannot collect network policy, EgressFirewall, egressip logs with gather_network_logs
1906655 - [SDN]Cannot colloect ovsdb-server.log and ovs-vswitchd.log with gather_network_logs
1906679 - quick start panel styles are not loaded
1906683 - Kn resources are not showing in Topology if triggers has KSVC and IMC as subscriber
1906684 - Event Source creation fails if user selects no app group and switch to yaml and then to form
1906685 - SinkBinding is shown in topology view if underlying resource along with actual source created
1906689 - user can pin to nav configmaps and secrets multiple times
1906691 - Add doc which describes disabling helm chart repository
1906713 - Quick starts not accesible for a developer user
1906718 - helm chart "provided by Redhat" is misspelled
1906732 - Machine API proxy support should be tested
1906745 - Update Helm endpoints to use Helm 3.4.x
1906760 - performance issues with topology constantly re-rendering
1906766 - localizedAutoscaled&Autoscalingpod texts overlap with the pod ring
1906768 - Virtualization nav item is incorrectly placed in the Admin Workloads section
1906769 - topology fails to load with non-kubeadmin user
1906770 - shortcuts on mobiles view occupies a lot of space
1906798 - Dev catalog customization doesn't update console-config ConfigMap
1906806 - Allow installing extra packages in ironic container images
1906808 - [test-disabled] ServiceAccounts should support OIDC discovery of service account issuer
1906835 - Topology view shows add page before then showing full project workloads
1906840 - ClusterOperator should not have status "Updating" if operator version is the same as the release version
1906844 - EndpointSlice and EndpointSliceProxying feature gates should be disabled for openshift-sdn kube-proxy
1906860 - Bump kube dependencies to v1.20 for Net Edge components
1906864 - Quick Starts Tour: Need to adjust vertical spacing
1906866 - Translations of Sample-Utils
1906871 - White screen when sort by name in monitoring alerts page
1906872 - Pipeline Tech Preview Badge Alignment
1906875 - Provide an option to force backup even when API is not available. 
1906877 - Placeholder' value in search filter do not match column heading in Vulnerabilities
1906879 - Add missing i18n keys
1906880 - oidcdiscoveryendpoint controller invalidates all TokenRequest API tokens during install
1906896 - No Alerts causes odd empty Table (Need no content message)
1906898 - Missing User RoleBindings in the Project Access Web UI
1906899 - Quick Start - Highlight Bounding Box Issue
1906916 - Teach CVO about flowcontrol.apiserver.k8s.io/v1beta1
1906933 - Cluster Autoscaler should have improved mechanisms for group identifiers
1906935 - Delete resources when Provisioning CR is deleted
1906968 - Must-gather should support collecting kubernetes-nmstate resources
1906986 - Ensure failed pod adds are retried even if the pod object doesn't change
1907199 - Need to upgrade machine-api-operator module version under cluster-api-provider-kubevirt
1907202 - configs.imageregistry.operator.openshift.io cluster does not update its status fields after URL change
1907211 - beta promotion of p&f switched storage version to v1beta1, making downgrades impossible. 
1907269 - Tooltips data are different when checking stack or not checking stack for the same time
1907280 - Install tour of OCS not available. 
1907282 - Topology page breaks with white screen
1907286 - The default mhc machine-api-termination-handler couldn't watch spot instance
1907287 - [csi-snapshot-webhook] should support both v1beta1 and v1 version when creating volumesnapshot/volumesnapshotcontent
1907293 - Increase timeouts in e2e tests
1907295 - Gherkin script for improve management for helm
1907299 - Advanced Subscription Badge for KMS and Arbiter not present
1907303 - Align VM template list items by baseline
1907304 - Use PF styles for selected template card in VM Wizard
1907305 - Drop 'ISO' from CDROM boot source message
1907307 - Support and provider labels should be passed on between templates and sources
1907310 - Pin action should be renamed to favorite
1907312 - VM Template source popover is missing info about added date
1907313 - ClusterOperator objects cannot be overriden with cvo-overrides
1907328 - iproute-tc package is missing in ovn-kube image
1907329 - CLUSTER_PROFILE env. variable is not used by the CVO
1907333 - Node stuck in degraded state, mcp reports "Failed to remove rollback: error running rpm-ostree cleanup -r: error: Timeout was reached"
1907373 - Rebase to kube 1.20.0
1907375 - Bump to latest available 1.20.x k8s - workloads team
1907378 - Gather netnamespaces networking info
1907380 - kube-rbac-proxy exposes tokens, has excessive verbosity
1907381 - OLM fails to deploy an operator if its deployment template contains a description annotation that doesn't match the CSV one
1907390 - prometheus-adapter: panic after k8s 1.20 bump
1907399 - build log icon link on topology nodes cause app to reload
1907407 - Buildah version not accessible
1907421 - [4.6.1]oc-image-mirror command failed on "error: unable to copy layer"
1907453 - Dev Perspective -> running vm details -> resources -> no data
1907454 - Install PodConnectivityCheck CRD with CNO
1907459 - "The Boot source is also maintained by Red Hat." is always shown for all boot sources
1907475 - Unable to estimate the error rate of ingress across the connected fleet
1907480 -Active alertssection throwing forbidden error for users. 
1907518 - Kamelets/Eventsource should be shown to user if they have create access
1907543 - Korean timestamps are shown when users' language preferences are set to German-en-en-US
1907610 - Update kubernetes deps to 1.20
1907612 - Update kubernetes deps to 1.20
1907621 - openshift/installer: bump cluster-api-provider-kubevirt version
1907628 - Installer does not set primary subnet consistently
1907632 - Operator Registry should update its kubernetes dependencies to 1.20
1907639 - pass dual-stack node IPs to kubelet in dual-stack clusters
1907644 - fix up handling of non-critical annotations on daemonsets/deployments
1907660 - Pod list does not render cell height correctly when pod names are too long (dynamic table rerendering issue?)
1907670 - CVE-2020-27846 crewjam/saml: authentication bypass in saml authentication
1907671 - Ingress VIP assigned to two infra nodes simultaneously - keepalived process running in pods seems to fail
1907767 - [e2e][automation]update test suite for kubevirt plugin
1907770 - Recent RHCOS 47.83 builds (from rhcos-47.83.202012072210-0 on) don't allow master and worker nodes to boot
1907792 - Theoverridesof the OperatorCondition cannot block the operator upgrade
1907793 - Surface support info in VM template details
1907812 - 4.7 to 4.6 downgrade stuck in clusteroperator storage
1907822 - [OCP on OSP] openshift-install panic when checking quota with install-config have no flavor set
1907863 - Quickstarts status not updating when starting the tour
1907872 - dual stack with an ipv6 network fails on bootstrap phase
1907874 - QE - Design Gherkin Scenarios for epic ODC-5057
1907875 - No response when try to expand pvc with an invalid size
1907876 - Refactoring record package to make gatherer configurable
1907877 - QE - Automation- pipelines builder scripts
1907883 - Fix Pipleine creation without namespace issue
1907888 - Fix pipeline list page loader
1907890 - Misleading and incomplete alert message shown in pipeline-parameters and pipeline-resources form
1907892 - Unable to edit application deployed using "From Devfile" option
1907893 - navSortUtils.spec.ts unit test failure
1907896 - When a workload is added, Topology does not place the new items well
1907908 - VM Wizard always uses VirtIO for the VM rootdisk regardless what is defined in common-template
1907924 - Enable madvdontneed in OpenShift Images
1907929 - Enable madvdontneed in OpenShift System Components Part 2
1907936 - NTO is not reporting nto_profile_set_total metrics correctly after reboot
1907947 - The kubeconfig saved in tenantcluster shouldn't include anything that is not related to the current context
1907948 - OCM-O bump to k8s 1.20
1907952 - bump to k8s 1.20
1907972 - Update OCM link to open Insights tab
1907989 - DataVolumes was intorduced in common templates - VM creation fails in the UI
1907998 - Gather kube_pod_resource_request/limit metrics as exposed in upstream KEP 1916
1908001 - [CVE-2020-10749] Update github.com/containernetworking/plugins to v.0.8.6 in egress-router-cni
1908014 - e2e-aws-ansible and e2e-aws-helm are broken in ocp-release-operator-sdk
1908035 - dynamic-demo-plugin build does not generate dist directory
1908135 - quick search modal is not centered over topology
1908145 - kube-scheduler-recovery-controller container crash loop when router pod is co-scheduled
1908159 - [AWS C2S] MCO fails to sync cloud config
1908171 - GCP: Installation fails when installing cluster with n1-custom-4-16384custom type (n1-custom-4-16384)
1908180 - Add source for template is stucking in preparing pvc
1908217 - CI: Server-Side Apply should work for oauth.openshift.io/v1: has no tokens
1908231 - [Migration] The pods ovnkube-node are in  CrashLoopBackOff after SDN to OVN
1908277 - QE - Automation- pipelines actions scripts
1908280 - Documentation describingignore-volume-azis incorrect
1908296 - Fix pipeline builder form yaml switcher validation issue
1908303 - [CVE-2020-28367 CVE-2020-28366] Remove CGO flag from rhel Dockerfile in Egress-Router-CNI
1908323 - Create button missing for PLR in the search page
1908342 - The new pv_collector_total_pv_count is not reported via telemetry
1908344 - [vsphere-problem-detector] CheckNodeProviderID and CheckNodeDiskUUID have the same name
1908347 - CVO overwrites ValidatingWebhookConfiguration for snapshots
1908349 - Volume snapshot tests are failing after 1.20 rebase
1908353 - QE - Automation- pipelines runs scripts
1908361 - bump to k8s 1.20
1908367 - QE - Automation- pipelines triggers scripts
1908370 - QE - Automation- pipelines secrets scripts
1908375 - QE - Automation- pipelines workspaces scripts
1908381 - Go Dependency Fixes for Devfile Lib
1908389 - Loadbalancer Sync failing on Azure
1908400 - Tests-e2e, increase timeouts, re-add TestArchiveUploadedAndResultsReceived
1908407 - Backport Upstream 95269 to fix potential crash in kubelet
1908410 - Exclude Yarn from VSCode search
1908425 - Create Role Binding form subject type and name are undefined when All Project is selected
1908431 - When the marketplace-operator pod get's restarted, the custom catalogsources are gone, as well as the pods
1908434 - Remove &apos from metal3-plugin internationalized strings
1908437 - Operator backed with no icon has no badge associated with the CSV tag
1908459 - bump to k8s 1.20
1908461 - Add bugzilla component to OWNERS file
1908462 - RHCOS 4.6 ostree removed dhclient
1908466 - CAPO AZ Screening/Validating
1908467 - Zoom in and zoom out in topology package should be sentence case
1908468 - [Azure][4.7] Installer can't properly parse instance type with non integer memory size
1908469 - nbdb failed to come up while bringing up OVNKubernetes cluster
1908471 - OLM should bump k8s dependencies to 1.20
1908484 - oc adm release extract --cloud=aws --credentials-requests dumps all manifests
1908493 - 4.7-e2e-metal-ipi-ovn-dualstack intermittent test failures, worker hostname is overwritten by NM
1908545 - VM clone dialog does not open
1908557 - [e2e][automation]Miss css id on bootsource and reviewcreate step on wizard
1908562 - Pod readiness is not being observed in real world cases
1908565 - [4.6] Cannot filter the platform/arch of the index image
1908573 - Align the style of flavor
1908583 - bootstrap does not run on additional networks if configured for master in install-config
1908596 - Race condition on operator installation
1908598 - Persistent Dashboard shows events for all provisioners
1908641 - Go back to Catalog Page link on Virtual Machine page vanishes on empty state
1908648 - Skip TestKernelType test on OKD, adjust TestExtensions
1908650 - The title of customize wizard is inconsistent
1908654 - cluster-api-provider: volumes and disks names shouldn't change by machine-api-operator
1908675 - Reenable [sig-storage] CSI mock volume CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=default [Suite:openshift/conformance/parallel] [Suite:k8s]
1908687 - Option to save user settings separate when using local bridge (affects console developers only)
1908697 - Showkubectl diff command in the oc diff help page
1908715 - Pressing the arrow up key when on topmost quick-search list item it should loop back to bottom
1908716 - UI breaks on click of sidebar of ksvc (if revisions not up) in topology on 4.7 builds
1908717 - "missing unit character in duration" error in some network dashboards
1908746 - [Safari] Drop Shadow doesn't works as expected on hover on workload
1908747 - stale S3 CredentialsRequest in CCO manifest
1908758 - AWS: NLB timeout value is rejected by AWS cloud provider after 1.20 rebase
1908830 - RHCOS 4.6 - Missing Initiatorname
1908868 - Update empty state message for EventSources and Channels tab
1908880 - 4.7 aws-serial CI: NoExecuteTaintManager Single Pod [Serial] eventually evict pod with finite tolerations from tainted nodes
1908883 - CVE-2020-29652 golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference
1908888 - Dualstack does not work with multiple gateways
1908889 - Bump CNO to k8s 1.20
1908891 - TestDNSForwarding DNS operator e2e test is failing frequently
1908914 - CNO: upgrade nodes before masters
1908918 - Pipeline builder yaml view sidebar is not responsive
1908960 - QE - Design Gherkin Scenarios
1908971 - Gherkin Script for pipeline debt 4.7
1908983 - i18n: Add Horizontal Pod Autoscaler action menu is not translated
1908997 - Unsupported access mode should not be available when creating pvc by cinder-csi-driver/gcp-pd-csi-driver from web-console
1908998 - [cinder-csi-driver] doesn't detect the credentials change
1909004 - "No datapoints found" for RHEL node's filesystem graph
1909005 - i18n: workloads list view heading is not translated
1909012 - csi snapshot webhook does not block any invalid update for volumesnapshot and volumesnapshotcontent objects
1909027 - Disks option of Sectected capacity chart shows HDD disk even on selection of SDD disk type
1909043 - OCP + OCS 4.7 Internal - Storage cluster creation throws warning when zone=0 in VMware
1909067 - Web terminal should keep latest output when connection closes
1909070 - PLR and TR Logs component is not streaming as fast as tkn
1909092 - Error Message should not confuse user on Channel form
1909096 - OCP 4.7+OCS 4.7 - The Requested Cluster Capacity field needs to include the selected capacity in calculation in Review and Create Page
1909108 - Machine API components should use 1.20 dependencies
1909116 - Catalog Sort Items dropdown is not aligned on Firefox
1909198 - Move Sink action option is not working
1909207 - Accessibility Issue on monitoring page
1909236 - Remove pinned icon overlap on resource name
1909249 - Intermittent packet drop from pod to pod
1909276 - Accessibility Issue on create project modal
1909289 - oc debug of an init container no longer works
1909290 - Logging may be broken due to mix of k8s.io/klog v1 and v2
1909358 - registry.redhat.io/redhat/community-operator-index:latest only have hyperfoil-bundle
1909453 - Boot disk RAID can corrupt ESP if UEFI firmware writes to it
1909455 - Boot disk RAID will not boot if the primary disk enumerates but fails I/O
1909464 - Build operator-registry with golang-1.15
1909502 - NO_PROXY is not matched between bootstrap and global cluster setting which lead to desired master machineconfig is not found
1909521 - Add kubevirt cluster type for e2e-test workflow
1909527 - [IPI Baremetal] After upgrade from 4.6 to 4.7 metal3 pod does not get created
1909587 - [OCP4] all of the OCP master nodes with soft-anti-affinity run on the same OSP node
1909610 - Fix available capacity when no storage class selected
1909678 - scale up / down buttons available on pod details side panel
1909723 - cluster-api-provider-openstack: Update ose-openstack-machine-controllers builder & base images to be consistent with ART
1909730 - unbound variable error if EXTRA_PKGS_LIST is not defined
1909739 - Arbiter request data changes
1909744 - cluster-api-provider-openstack: Bump gophercloud
1909790 - PipelineBuilder yaml view cannot be used for editing a pipeline
1909791 - Update standalone kube-proxy config for EndpointSlice
1909792 - Empty states for some details page subcomponents are not i18ned
1909815 - Perspective switcher is only half-i18ned
1909821 - OCS 4.7 LSO installation blocked because of Error "Invalid value: "integer": spec.flexibleScaling in body
1909836 - operator-install-global Cypress test was failing in OLM as it depends on an operator that isn't installed in CI
1909864 - promote-release-openshift-machine-os-content-e2e-aws-4.5 is perm failing
1909911 - [OVN]EgressFirewall caused a segfault
1909943 - Upgrade from 4.6 to 4.7 stuck due to write /sys/devices/xxxx/block/sda/queue/scheduler: invalid argument
1909958 - Support Quick Start Highlights Properly
1909978 - ignore-volume-az = yes not working on standard storageClass
1909981 - Improve statement in template select step
1909992 - Fail to pull the bundle image when using the private index image
1910024 - Reload issue in latest(4.7) UI code on 4.6 cluster locally in dev
1910036 - QE - Design Gherkin Scenarios ODC-4504
1910049 - UPI: ansible-galaxy is not supported
1910127 - [UPI on oVirt]:  Improve UPI Documentation
1910140 - fix the api dashboard with changes in upstream kube 1.20
1910160 - If two OperatorConditions include the same deployments they will keep updating the deployment's containers with the OPERATOR_CONDITION_NAME Environment Variable
1910165 - DHCP to static lease script doesn't handle multiple addresses
1910305 - [Descheduler] - The minKubeVersion should be 1.20.0
1910409 - Notification drawer is not localized for i18n
1910459 - Could not provision gcp volume if delete secret gcp-pd-cloud-credentials
1910492 - KMS details are auto-populated on the screen in next attempt at Storage cluster creation
1910501 - Installed Operators->Operand required: Clicking on cancel in Storage cluster page takes back to the Install Operator page
1910533 - [OVN] It takes about 5 minutes for EgressIP failover to work
1910581 - library-go: proxy ENV is not injected into csi-driver-controller which lead to storage operator never get ready
1910666 - Creating a Source Secret from type SSH-Key should use monospace font for better usability
1910738 - OCP 4.7 Installation fails on VMWare due to 1 worker that is degraded
1910739 - Redfish-virtualmedia (idrac) deploy fails on "The Virtual Media image server is already connected"
1910753 - Support Directory Path to Devfile
1910805 - Missing translation for Pipeline status and breadcrumb text
1910829 - Cannot delete a PVC if the dv's phase is WaitForFirstConsumer
1910840 - Show Nonexistent  command info in theoc rollback -hhelp page
1910859 - breadcrumbs doesn't use last namespace
1910866 - Unify templates string
1910870 - Unify template dropdown action
1911016 - Prometheus unable to mount NFS volumes after upgrading to 4.6
1911129 - Monitoring charts renders nothing when switching from a Deployment to "All workloads"
1911176 - [MSTR-998] Wrong text shown when hovering on lines of charts in API Performance dashboard
1911212 - [MSTR-998] API Performance Dashboard "Period" drop-down has a choice "$__auto_interval_period" which can bring "1:154: parse error: missing unit character in duration"
1911213 - Wrong and misleading warning for VMs that were created manually (not from template)
1911257 - [aws-c2s] failed to create cluster, kube-cloud-config was not created
1911269 - waiting for the build message present when build exists
1911280 - Builder images are not detected for Dotnet, Httpd, NGINX
1911307 - Pod Scale-up requires extra privileges in OpenShift web-console
1911381 - "Select Persistent Volume Claim project" shows in customize wizard when select a source available template
1911382 - "source volumeMode (Block) and target volumeMode (Filesystem) do not match" shows in VM Error
1911387 - Hit error - "Cannot read property 'value' of undefined" while creating VM from template
1911408 - [e2e][automation] Add auto-clone cli tests and new flow of VM creation
1911418 - [v2v] The target storage class name is not displayed if default storage class is used
1911434 - git ops empty state page displays icon with watermark
1911443 - SSH Cretifiaction field should be validated
1911465 - IOPS display wrong unit
1911474 - Devfile Application Group Does Not Delete Cleanly (errors)
1911487 - Pruning Deployments should use ReplicaSets instead of ReplicationController
1911574 - Expose volume mode  on Upload Data form
1911617 - [CNV][UI] Failure to add source to VM template when no default storage class is defined
1911632 - rpm-ostree command fail due to wrong options when updating ocp-4.6 to 4.7 on worker nodes with rt-kernel
1911656 - using 'operator-sdk run bundle' to install operator successfully, but the command output said 'Failed to run bundle''
1911664 - [Negative Test] After deleting metal3 pod, scaling worker stuck on provisioning state
1911782 - Descheduler should not evict pod used local storage by the PVC
1911796 - uploading flow being displayed before submitting the form
1912066 - The ansible type operator's manager container is not stable when managing the CR
1912077 - helm operator's default rbac forbidden
1912115 - [automation] Analyze job keep failing because of 'JavaScript heap out of memory'
1912237 - Rebase CSI sidecars for 4.7
1912381 - [e2e][automation] Miss css ID on Create Network Attachment Definition page
1912409 - Fix flow schema deployment
1912434 - Update guided tour modal title
1912522 - DNS Operator e2e test: TestCoreDNSImageUpgrade is fundamentally broken
1912523 - Standalone pod status not updating in topology graph
1912536 - Console Plugin CR for console-demo-plugin has wrong apiVersion
1912558 - TaskRun list and detail screen doesn't show Pending status
1912563 - p&f: carry 97206: clean up executing request on panic
1912565 - OLM macOS local build broken by moby/term dependency
1912567 - [OCP on RHV] Node becomes to 'NotReady' status when shutdown vm from RHV UI only on the second deletion
1912577 - 4.1/4.2->4.3->...-> 4.7 upgrade is stuck during 4.6->4.7 with co/openshift-apiserver Degraded, co/network not Available and several other components pods CrashLoopBackOff
1912590 - publicImageRepository not being populated
1912640 - Go operator's controller pods is forbidden
1912701 - Handle dual-stack configuration for NIC IP
1912703 - multiple queries can't be plotted in the same graph under some conditons
1912730 - Operator backed: In-context should support visual connector if SBO is not installed
1912828 - Align High Performance VMs with High Performance in RHV-UI
1912849 - VM from wizard - default flavor does not match the actual flavor set by common templates
1912852 - VM from wizard - available VM templates - "storage" field is "0 B"
1912888 - recycler template should be moved to KCM operator
1912907 - Helm chart repository index can contain unresolvable relative URL's
1912916 - Set external traffic policy to cluster for IBM platform
1912922 - Explicitly specifying the operator generated default certificate for an ingress controller breaks the ingress controller
1912938 - Update confirmation modal for quick starts
1912942 - cluster-storage-operator: proxy ENV is not injected into vsphere-problem-detector deployment
1912944 - cluster-storage-operator: proxy ENV is not injected into Manila CSI driver operator deployment
1912945 - aws-ebs-csi-driver-operator: proxy ENV is not injected into the CSI driver
1912946 - gcp-pd-csi-driver-operator: proxy ENV is not injected into the CSI driver
1912947 - openstack-cinder-csi-driver-operator: proxy ENV is not injected into the CSI driver
1912948 - csi-driver-manila-operator: proxy ENV is not injected into the CSI driver
1912949 - ovirt-csi-driver-operator: proxy ENV is not injected into the CSI driver
1912977 - rebase upstream static-provisioner
1913006 - Remove etcd v2 specific alerts with etcd_http* metrics
1913011 - [OVN] Pod's external traffic not use egressrouter macvlan ip as a source ip
1913037 - update static-provisioner base image
1913047 - baremetal clusteroperator progressing status toggles between true and false when cluster is in a steady state
1913085 - Regression OLM uses scoped client for CRD installation
1913096 - backport: cadvisor machine metrics are missing in k8s 1.19
1913132 - The installation of Openshift Virtualization reports success early before it 's succeeded eventually
1913154 - Upgrading to 4.6.10 nightly failed with RHEL worker nodes: Failed to find /dev/disk/by-label/root
1913196 - Guided Tour doesn't handle resizing of browser
1913209 - Support modal should be shown for community supported templates
1913226 - [Migration] The SDN migration rollback failed if customize vxlanPort
1913249 - update info alert this template is not aditable
1913285 - VM list empty state should link to virtualization quick starts
1913289 - Rebase AWS EBS CSI driver for 4.7
1913292 - OCS 4.7 Installation failed over vmware when arbiter was enabled, as flexibleScaling is also getting enabled
1913297 - Remove restriction of taints for arbiter node
1913306 - unnecessary scroll bar is present on quick starts panel
1913325 - 1.20 rebase for openshift-apiserver
1913331 - Import from git: Fails to detect Java builder
1913332 - Pipeline visualization breaks the UI when multiple taskspecs are used
1913343 - (release-4.7) Added changelog file for insights-operator
1913356 - (release-4.7) Implemented gathering specific logs from openshift apiserver operator
1913371 - Missing i18n key "Administrator" in namespace "console-app" and language "en."
1913386 - users can see metrics of namespaces for which they don't have rights when monitoring own services with prometheus user workloads
1913420 - Time duration setting of resources is not being displayed
1913536 - 4.6.9 -> 4.7 upgrade hangs.  RHEL 7.9 worker stuck on "error enabling unit: Failed to execute operation: File exists\\n\"
1913554 - Recording rule for ingress error fraction SLI is incorrect, uses irate instead of increase
1913560 - Normal user cannot load template on the new wizard
1913563 - "Virtual Machine" is not on the same line in create button when logged with normal user
1913567 - Tooltip data should be same for line chart or stacked chart, display data value same as the table
1913568 - Normal user cannot create template
1913582 - [Migration]SDN to OVN migration stucks on MCO for rhel worker
1913585 - Topology descriptive text fixes
1913608 - Table data contains data value None after change time range in graph and change back
1913651 - Improved Red Hat image and crashlooping OpenShift pod collection
1913660 - Change location and text of Pipeline edit flow alert
1913685 - OS field not disabled when creating a VM from a template
1913716 - Include additional use of existing libraries
1913725 - Refactor Insights Operator Plugin states
1913736 - Regression: fails to deploy computes when using root volumes
1913747 - Update operator to kubernetes 1.20.1 to pickup upstream fixes
1913751 - add third-party network plugin test suite to openshift-tests
1913783 - QE-To fix the merging pr issue, commenting the afterEach() block
1913807 - Template support badge should not be shown for community supported templates
1913821 - Need definitive steps about uninstalling descheduler operator
1913851 - Cluster Tasks are not sorted in pipeline builder
1913864 - BuildConfig YAML template references ruby ImageStreamTag that no longer exists
1913951 - Update the Devfile Sample Repo to an Official Repo Host
1913960 - Cluster Autoscaler should use 1.20 dependencies
1913969 - Field dependency descriptor can sometimes cause an exception
1914060 - Disk created from 'Import via Registry' cannot be used as boot disk
1914066 - [sriov] sriov dp pod crash when delete ovs HW offload policy
1914090 - Grafana - The resulting dataset is too large to graph (OCS RBD volumes being counted as disks)
1914119 - vsphere problem detector operator has no permission to update storages.operator.openshift.io instances
1914125 - Still using /dev/vde as default device path when create localvolume
1914183 - Empty NAD page is missing link to quickstarts
1914196 - target port infrom dockerfileflow does nothing
1914204 - Creating VM from dev perspective may fail with template not found error
1914209 - Associate image secret name to pipeline serviceaccount imagePullSecrets
1914212 - [e2e][automation] Add test to validate bootable disk souce
1914250 - ovnkube-node fails on master nodes when both DHCPv6 and SLAAC addresses are configured on nodes
1914284 - Upgrade to OCP 4.6.9 results in cluster-wide DNS and connectivity issues due to bad NetworkPolicy flows
1914287 - Bring back selfLink
1914301 - User VM Template source should show the same provider as template itself
1914303 - linuxptp-daemon is not forwarding ptp4l stderr output to openshift logs
1914309 - /terminal page when WTO not installed shows nonsensical error
1914334 - order of getting started samples is arbitrary
1914343 - [sig-imageregistry][Feature:ImageTriggers] Annotation trigger reconciles after the image is overwritten [Suite:openshift/conformance/parallel]  timeout on s390x
1914349 - Increase and decrease buttons in max and min pods in HPA page has distorted UI
1914405 - Quick search modal should be opened when coming back from a selection
1914407 - Its not clear that node-ca is running as non-root
1914427 - Count of pods on the dashboard is incorrect
1914439 - Typo in SRIOV port create command example
1914451 - cluster-storage-operator pod running as root
1914452 - oc image append, oc image extract outputs wrong suggestion to use --keep-manifest-list=true
1914642 - Customize Wizard Storage tab does not pass validation
1914723 - SamplesTBRInaccessibleOnBoot Alert has a misspelling
1914793 - device names should not be translated
1914894 - Warn about using non-groupified api version
1914926 - webdriver-manager pulls incorrect version of ChomeDriver due to a bug
1914932 - Put correct resource name in relatedObjects
1914938 - PVC disk is not shown on customization wizard general tab
1914941 - VM Template rootdisk is not deleted after fetching default disk bus
1914975 - Collect logs from openshift-sdn namespace
1915003 - No estimate of average node readiness during lifetime of a cluster
1915027 - fix MCS blocking iptables rules
1915041 - s3:ListMultipartUploadParts is relied on implicitly
1915079 - Canary controller should not periodically rotate the canary route endpoint for performance reasons
1915080 - Large number of tcp connections with shiftstack ocp cluster in about 24 hours
1915085 - Pods created and rapidly terminated get stuck
1915114 - [aws-c2s] worker machines are not create during install
1915133 - Missing default pinned nav items in dev perspective
1915176 - Update snapshot API CRDs to v1 in web-console when creating volumesnapshot related resource
1915187 - Remove the "Tech preview" tag in web-console for volumesnapshot
1915188 - Remove HostSubnet anonymization
1915200 - [OCP 4.7+ OCS 4.6]Arbiter related Note should not show up during UI deployment
1915217 - OKD payloads expect to be signed with production keys
1915220 - Remove dropdown workaround for user settings
1915235 - Failed to upgrade to 4.7 from 4.6 due to the machine-config failure
1915262 - When deploying with assisted install the CBO operator is installed and enabled without metal3 pod
1915277 - [e2e][automation]fix cdi upload form test
1915295 - [BM][IP][Dualstack] Installation failed - operators report dial tcp 172.30.0.1:443: i/o timeout
1915304 - Updating scheduling component builder & base images to be consistent with ART
1915312 - Prevent schedule Linux openshift-network-diagnostics pod on Windows node
1915318 - [Metal] bareMetal IPI - cannot interact with toolbox container after first execution only in parallel from different connection
1915348 - [RFE] linuxptp operator needs to expose the uds_address_socket to be used by an application pod
1915357 - Dev Catalog doesn't load anything if virtualization operator is installed
1915379 - New template wizard should require provider and make support input a dropdown type
1915408 - Failure in operator-registry kind e2e test
1915416 - [Descheduler] descheduler evicts pod which does not have any ownerRef or descheduler evict annotation
1915460 - Cluster name size might affect installations
1915500 - [aws c2s] kube-controller-manager crash loops trying to fetch the AWS instance
1915540 - Silent 4.7 RHCOS install failure on ppc64le
1915579 - [Metal] redhat-support-tool became unavailable after tcpdump usage (BareMetal IPI)
1915582 - p&f: carry upstream pr 97860
1915594 - [e2e][automation] Improve test for disk validation
1915617 - Bump bootimage for various fixes
1915624 - "Please fill in the following field: Template provider" blocks customize wizard
1915627 - Translate Guided Tour text. 
1915643 - OCP4.6 to 4.7 upgrade failed due to manila csi driver operator sync error
1915647 - Intermittent White screen when the connector dragged to revision
1915649 - "Template support" pop up is not a warning; checkbox text should be rephrased
1915654 - [e2e][automation] Add a verification for Afinity modal should hint "Matching node found"
1915661 - Can't run the 'oc adm prune' command in a pod
1915672 - Kuryr doesn't work with selfLink disabled. 
1915674 - Golden image PVC creation - storage size should be taken from the template
1915685 - Message for not supported template is not clear enough
1915760 - Need to increase timeout to wait rhel worker get ready
1915793 - quick starts panel syncs incorrectly across browser windows
1915798 - oauth connection errors for openshift console pods on an OVNKube OCP 4.7 cluster
1915818 - vsphere-problem-detector: use "_totals" in metrics
1915828 - Latest Dell firmware (04.40.00.00) fails to install IPI on BM using idrac-virtualmedia protocol
1915859 - vsphere-problem-detector: does not report ESXi host version nor VM HW version
1915871 - operator-sdk version in new downstream image should be v1.2.0-ocp not v4.7.0
1915879 - Pipeline Dashboard tab Rename to Pipeline Metrics
1915885 - Kuryr doesn't support workers running on multiple subnets
1915898 - TaskRun log output shows "undefined" in streaming
1915907 - test/cmd/builds.sh uses docker.io
1915912 - sig-storage-csi-snapshotter image not available
1915926 - cluster-api-provider-openstack: Update ose-openstack-machine-controllers builder & base images to be consistent with ART
1915929 - A11y Violation: svg-img-alt for time axis of Utilization Card on Cluster Dashboard
1915939 - Resizing the browser window removes Web Terminal Icon
1915945 - [sig-scheduling] SchedulerPreemption [Serial] validates basic preemption works [Conformance]
1915959 - Baremetal cluster operator is included in a ROKS installation of 4.7
1915962 - ROKS: manifest with machine health check fails to apply in 4.7
1915972 - Global configuration breadcrumbs do not work as expected
1915981 - Install ethtool and conntrack in container for debugging
1915995 - "Edit RoleBinding Subject" action under RoleBinding list page kebab actions causes unhandled exception
1915998 - Installer bootstrap node setting of additional subnets inconsistent with additional security groups
1916021 - OLM enters infinite loop if Pending CSV replaces itself
1916056 - Need Visual Web Terminal metric enabled for OCP monitoring telemetry
1916081 - non-existant should be non-existent in CloudCredentialOperatorTargetNamespaceMissing alert's annotations
1916099 - VM creation - customization wizard - user should be allowed to delete and re-create root disk
1916126 - [e2e][automation] Help fix tests for vm guest-agent and next-run-configuration
1916145 - Explicitly set minimum versions of python libraries
1916164 - Update csi-driver-nfs builder & base images to be consistent with ART
1916221 - csi-snapshot-controller-operator: bump dependencies for 4.7
1916271 - Known issues should mention failure to apply soft-anti-affinity to masters beyond the third
1916363 - [OVN] ovs-configuration.service reports as failed within all nodes using version 4.7.0-fc.2
1916379 - error metrics from vsphere-problem-detector should be gauge
1916382 - Can't create ext4 filesystems with Ignition
1916384 - 4.5.15 and later cluster-version operator does not sync ClusterVersion status before exiting, leaving 'verified: false' even for verified updates
1916401 - Deleting an ingress controller with a bad DNS Record hangs
1916417 - [Kuryr] Must-gather does not have all Custom Resources information
1916419 - [sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image
1916454 - teach CCO about upgradeability from 4.6 to 4.7
1916486 - [OCP RHV] [Docs] Update RHV CSI provisioning section in OCP documenation
1916502 - Boot disk mirroring fails with mdadm error
1916524 - Two rootdisk shows on storage step
1916580 - Default yaml is broken for VM and VM template
1916621 - oc adm node-logs examples are wrong
1916642 - [zh_CN] Redundant period in Secrets - Create drop down menu - Key value secret. 
1916692 - Possibly fails to destroy LB and thus cluster
1916711 - Update Kube dependencies in MCO to 1.20.0
1916747 - remove links to quick starts if virtualization operator isn't updated to 2.6
1916764 - editing a workload with no application applied, will auto fill the app
1916834 - Pipeline Metrics - Text Updates
1916843 - collect logs from openshift-sdn-controller pod
1916853 - cluster will not gracefully recover if openshift-etcd namespace is removed
1916882 - OCS 4.7 LSO : wizard (Discover disks and create storageclass) does not show zone when topology.kubernetes.io/zone are added manually
1916888 - OCS wizard Donor chart does not get updated whenDevice Typeis edited
1916938 - Using 4.6 install-config.yaml file with lbFloatingIP results in validation error "Forbidden: cannot specify lbFloatingIP and apiFloatingIP together"
1916949 - ROKS: manifests in openshift-oauth-apiserver ns fails to create with non-existent namespace
1917101 - [UPI on oVirt] - 'RHCOS image' topic isn't located in the right place in UPI document
1917114 - Upgrade from 4.5.9 to 4.7 fails as authentication operator is Degraded due to '"ProxyConfigController" controller failed to sync "key"' error
1917117 - Common templates - disks screen: invalid disk name
1917124 - Custom template - clone existing PVC - the name of the target VM's data volume is hard-coded; only one VM can be created
1917146 - [oVirt] Consume 23-10 ovirt sdk- csi operator
1917147 - [oVirt] csi operator panics if ovirt-engine suddenly becomes unavailable. 
1917148 - [oVirt] Consume 23-10 ovirt sdk
1917239 - Monitoring time options overlaps monitoring tab navigation when Quickstart panel is opened
1917272 - Should update the default minSize to 1Gi when create localvolumeset on web console
1917303 - [automation][e2e] make kubevirt-plugin gating job mandatory
1917315 - localvolumeset-local-provisoner-xxx pods are not killed after upgrading from 4.6 to 4.7
1917327 - annotations.message maybe wrong for NTOPodsNotReady alert
1917367 - Refactor periodic.go
1917371 - Add docs on how to use the built-in profiler
1917372 - Application metrics are shown on Metrics dashboard but not in linked Prometheus UI in OCP management console
1917395 - pv-pool backing store name restriction should be at 43 characters from the ocs ui
1917484 - [BM][IPI] Failed to scale down machineset
1917522 - Deprecate --filter-by-os in oc adm catalog mirror
1917537 - controllers continuously busy reconciling operator
1917551 - use min_over_time for vsphere prometheus alerts
1917585 - OLM Operator install page missing i18n
1917587 - Manila CSI operator becomes degraded if user doesn't have permissions to list share types
1917605 - Deleting an exgw causes pods to no longer route to other exgws
1917614 - [aws c2s] ingress operator uses unavailable resourcegrouptaggings API
1917656 - Add to Project/application for eventSources from topology shows 404
1917658 - Show TP badge for sources powered by camel connectors in create flow
1917660 - Editing parallelism of job get error info
1917678 - Could not provision pv when no symlink and target found on rhel worker
1917679 - Hide double CTA in admin pipelineruns tab
1917683 -NodeTextFileCollectorScrapeErroralert in OCP 4.6 cluster. 
1917759 - Console operator panics after setting plugin that does not exists to the console-operator config
1917765 - ansible-operator version in downstream image should be v1.3.0 not v4.7.0
1917770 - helm-operator version in downstream image should be v1.3.0 not v4.7.0
1917799 - Gather s list of names and versions of installed OLM operators
1917803 - [sig-storage] Pod Disks should be able to delete a non-existent PD without error
1917814 - Show Broker create option in eventing under admin perspective
1917838 - MachineSet scaling from 0 is not available or evaluated incorrectly for the new or changed instance types
1917872 - [oVirt] rebase on latest SDK 2021-01-12
1917911 - network-tools needs ovnkube-trace binary from ovn-kubernetes image
1917938 - upgrade version of dnsmasq package
1917942 - Canary controller causes panic in ingress-operator
1918019 - Undesired scrollbars in markdown area of QuickStart
1918068 - Flaky olm integration tests
1918085 - reversed name of job and namespace in cvo log
1918112 - Flavor is not editable if a customize VM is created from cli
1918129 - Update IO sample archive with missing resources & remove IP anonymization from clusteroperator resources
1918132 - i18n: Volume Snapshot Contents menu is not translated
1918133 - [e2e][automation] Fix ocp 4.7 existing tests - part2
1918140 - Deployment openstack-cinder-csi-driver-controller and openstack-manila-csi-controllerplugin doesn't be installed on OSP
1918153 - When&character is set as an environment variable in a build config it is getting converted as\u00261918185 - Capitalization on PLR details page
1918287 - [ovirt] ovirt csi driver is flooding RHV with API calls and spam the event UI with new connections
1918318 - Kamelet connector's are not shown in eventing section under Admin perspective
1918351 - Gather SAP configuration (SCC & ClusterRoleBinding)
1918375 - [calico] rbac-proxy container in kube-proxy fails to create tokenreviews
1918395 - [ovirt] increase livenessProbe period
1918415 - MCD nil pointer on dropins
1918438 - [ja_JP, zh_CN] Serverless i18n misses
1918440 - Kernel Arguments get reapplied even when no new kargs has been added in MachineConfig
1918471 - CustomNoUpgrade Feature gates are not working correctly
1918558 - Supermicro nodes boot to PXE upon reboot after successful deployment to disk
1918622 - Updating ose-jenkins-agent-maven builder & base images to be consistent with ART
1918623 - Updating ose-jenkins-agent-nodejs-12 builder & base images to be consistent with ART
1918625 - Updating ose-jenkins-agent-nodejs-10 builder & base images to be consistent with ART
1918635 - Updating openshift-jenkins-2 builder & base images to be consistent with ART #1197
1918639 - Event listener with triggerRef crashes the console
1918648 - Subscription page doesn't show InstallPlan correctly
1918716 - Manilacsi becomes degraded even though it is not available with the underlying Openstack
1918748 - helmchartrepo is not http(s)_proxy-aware
1918757 - Consistant fallures of features/project-creation.feature Cypress test in CI
1918803 - Need dedicated details page w/ global config breadcrumbs for 'KnativeServing' plugin
1918826 - Insights popover icons are not horizontally aligned
1918879 - need better debug for bad pull secrets
1918958 - The default NMstate instance from the operator is incorrect
1919097 - Close bracket ")" missing at the end of the sentence in the UI
1919231 - quick search modal cut off on smaller screens
1919259 - Make "Add x" singular in Pipeline Builder
1919260 - VM Template list actions should not wrap
1919271 - NM prepender script doesn't support systemd-resolved
1919341 - Updating ose-jenkins-agent-maven builder & base images to be consistent with ART
1919360 - Need managed-cluster-info metric enabled for OCP monitoring telemetry
1919379 - dotnet logo out of date
1919387 - Console login fails with no error when it can't write to localStorage
1919396 - A11y Violation: svg-img-alt on Pod Status ring
1919407 - OpenStack IPI has three-node control plane limitation, but InstallConfigs aren't verified
1919750 - Search InstallPlans got Minified React error
1919778 - Upgrade is stuck in insights operator Degraded with "Source clusterconfig could not be retrieved" until insights operator pod is manually deleted
1919823 - OCP 4.7 Internationalization Chinese tranlate issue
1919851 - Visualization does not render when Pipeline & Task share same name
1919862 - The tip information foroc new-project  --skip-config-writeis wrong
1919876 - VM created via customize wizard cannot inherit template's PVC attributes
1919877 - Click on KSVC breaks with white screen
1919879 - The toolbox container name is changed from 'toolbox-root'  to 'toolbox-' in a chroot environment
1919945 - user entered name value overridden by default value when selecting a git repository
1919968 - [release-4.7] Undiagnosed panic detected in pod runtime.go:76: invalid memory address or nil pointer dereference
1919970 - NTO does not update when the tuned profile is updated. 
1919999 - Bump Cluster Resource Operator Golang Versions
1920027 - machine-config-operator consistently failing during 4.6 to 4.7 upgrades and clusters do not install successfully with proxy configuration
1920200 - user-settings network error results in infinite loop of requests
1920205 - operator-registry e2e tests not working properly
1920214 - Bump golang to 1.15 in cluster-resource-override-admission
1920248 - re-running the pipelinerun with pipelinespec crashes the UI
1920320 - VM template field is "Not available" if it's created from common template
1920367 - When creating localvolumeset instance from the web console, the title for setting volumeMode isDisk Mode1920368 - Fix containers creation issue resulting in runc running on Guaranteed Pod CPUs
1920390 - Monitoring > Metrics graph shifts to the left when clicking the "Stacked" option and when toggling data series lines on / off
1920426 - Egress Router CNI OWNERS file should have ovn-k team members
1920427 - Need to updateoc loginhelp page since we don't support prompt interactively for the username
1920430 - [V2V] [UI] Browser window becomes empty when running import wizard for the first time
1920438 - openshift-tuned panics on turning debugging on/off. 
1920445 - e2e-gcp-ovn-upgrade job is actually using openshift-sdn
1920481 - kuryr-cni pods using unreasonable amount of CPU
1920509 - wait for port 6443 to be open in the kube-scheduler container; use ss instead of lsof
1920524 - Topology graph crashes adding Open Data Hub operator
1920526 - catalog operator causing CPU spikes and bad etcd performance
1920551 - Boot Order is not editable for Templates in "openshift" namespace
1920555 - bump cluster-resource-override-admission api dependencies
1920571 - fcp multipath will not recover failed paths automatically
1920619 - Remove default scheduler profile value
1920655 - Console should not show the Create Autoscaler link in cluster settings when the CRD is not present
1920674 - MissingKey errors in bindings namespace
1920684 - Text in language preferences modal is misleading
1920695 - CI is broken because of bad image registry reference in the Makefile
1920756 - update generic-admission-server library to get the system:masters authorization optimization
1920769 - [Upgrade] OCP upgrade from 4.6.13 to 4.7.0-fc.4 for "network-check-target" failed when "defaultNodeSelector" is set
1920771 - i18n: Delete persistent volume claim drop down is not translated
1920806 - [OVN]Nodes lost network connection after reboot on the vSphere UPI
1920912 - Unable to power off BMH from console
1920981 - When OCS was deployed with arbiter mode enable add capacity is increasing the count by "2"
1920984 - [e2e][automation] some menu items names are out dated
1921013 - Gather PersistentVolume definition (if any) used in image registry config
1921023 - Do not enable Flexible Scaling to true for Internal mode clusters(revert to 4.6 behavior)
1921087 - 'start next quick start' link doesn't work and is unintuitive
1921088 - test-cmd is failing on volumes.sh pretty consistently
1921248 - Clarify the kubelet configuration cr description
1921253 - Text filter default placeholder text not internationalized
1921258 - User Preferences: Active perspective and project change in the current window when selected in a different window
1921275 - Panic in authentication-operator in (*deploymentController).updateOperatorDeploymentInfo
1921277 - Fix Warning and Info log statements to handle arguments
1921281 - oc get -o yaml --export returns "error: unknown flag: --export"
1921458 - [SDK] Gracefully handle therun bundle-upgradeif the lower version operator doesn't exist
1921556 - [OCS with Vault]: OCS pods didn't comeup after deploying with Vault details from UI
1921572 - For external source (i.e GitHub Source) form view as well shows yaml
1921580 - [e2e][automation]Test VM detail view actions dropdown does not pass
1921610 - Pipeline metrics font size inconsistency
1921644 - [e2e][automation] tests errors with wrong cloudInit new line syntax
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
1921655 - [OSP] Incorrect error handling during cloudinfo generation
1921713 - [e2e][automation]  fix failing VM migration tests
1921762 - Serving and Eventing breadcrumbs should direct users back to tabbed page view
1921774 - delete application modal errors when a resource cannot be found
1921806 - Explore page APIResourceLinks aren't i18ned
1921823 - CheckBoxControls not internationalized
1921836 - AccessTableRows don't internationalize "User" or "Group"
1921857 - Test flake when hitting router in e2e tests due to one router not being up to date
1921880 - Dynamic plugins are not initialized on console load in production mode
1921911 - Installer PR #4589 is causing leak of IAM role policy bindings
1921921 - "Global Configuration" breadcrumb does not use sentence case
1921949 - Console bug - source code URL broken for gitlab self-hosted repositories
1921954 - Subscription-related constraints in ResolutionFailed events are misleading
1922015 - buttons in modal header are invisible on Safari
1922021 - Nodes terminal page 'Expand' 'Collapse' button not translated
1922050 - [e2e][automation] Improve vm clone tests
1922066 - Cannot create VM from custom template which has extra disk
1922098 - Namespace selection dialog is not closed after select a namespace
1922099 - Updated Readme documentation for QE code review and setup
1922146 - Egress Router CNI doesn't have logging support. 
1922267 - Collect specific ADFS error
1922292 - Bump RHCOS boot images for 4.7
1922454 - CRI-O doesn't enable pprof by default
1922473 - reconcile LSO images for 4.8
1922573 - oc returns an error while using -o jsonpath when there is no resource found in the namespace
1922782 - Source registry missing docker:// in yaml
1922907 - Interop UI Tests - step implementation for updating feature files
1922911 - Page crash when click the "Stacked" checkbox after clicking the data series toggle buttons
1922991 - "verify /run filesystem contents do not have unexpected content using a simple Docker Strategy Build" test fails on OKD
1923003 - WebConsole Insights widget showing "Issues pending" when the cluster doesn't report anything
1923098 - [vsphere-problem-detector-operator] Need permission to access replicasets.apps resources
1923102 - [vsphere-problem-detector-operator] pod's version is not correct
1923245 - [Assisted-4.7] [Staging][Minimal-ISO] nodes fails to boot
1923674 - k8s 1.20 vendor dependencies
1923721 - PipelineRun running status icon is not rotating
1923753 - Increase initialDelaySeconds for ovs-daemons container in the ovs-node daemonset for upgrade scenarios
1923774 - Docker builds failing for openshift/cluster-resource-override-admission-operator
1923802 - ci/prow/e2e-aws-olm build failing for openshift/cluster-resource-override-admission-operator
1923874 - Unable to specify values with % in kubeletconfig
1923888 - Fixes error metadata gathering
1923892 - Update arch.md after refactor. 
1923894 - "installed" operator status in operatorhub page does not reflect the real status of operator
1923895 - Changelog generation. 
1923911 - [e2e][automation] Improve tests for vm details page and list filter
1923945 - PVC Name and Namespace resets when user changes os/flavor/workload
1923951 - EventSources showsundefined` in project
1923973 - Dynamic plugin demo README does not contain info how to enable the ConsolePlugins
1924046 - Localhost: Refreshing on a Project removes it from nav item urls
1924078 - Topology quick search View all results footer should be sticky. 
1924081 - NTO should ship the latest Tuned daemon release 2.15
1924084 - backend tests incorrectly hard-code artifacts dir
1924128 - [sig-builds][Feature:Builds] verify /run filesystem contents  do not have unexpected content using a simple Docker Strategy Build
1924135 - Under sufficient load, CRI-O may segfault
1924143 - Code Editor Decorator url is broken for Bitbucket repos
1924188 - Language selector dropdown doesn't always pre-select the language
1924365 - Add extra disk for VM which use boot source PXE
1924383 - Degraded network operator during upgrade to 4.7.z
1924387 - [ja_JP][zh_CN] Incorrect warning message for deleting namespace on Delete Pod dialog box. 
1924480 - non cluster admin can not take VM snapshot: An error occurred, cannot set blockOwnerDeletion if an ownerReference refers to a resource you can't set finalizers on
1924583 - Deprectaed templates are listed in the Templates screen
1924870 - pick upstream pr#96901: plumb context with request deadline
1924955 - Images from Private external registry not working in deploy Image
1924961 - k8sutil.TrimDNS1123Label creates invalid values
1924985 - Build egress-router-cni for both RHEL 7 and 8
1925020 - Console demo plugin deployment image shoult not point to dockerhub
1925024 - Remove extra validations on kafka source form view net section
1925039 - [e2e] Fix Test - ID(CNV-5327) Change Custom Flavor while VM is running
1925072 - NTO needs to ship the current latest stalld v1.7.0
1925163 - Missing info about dev catalog in boot source template column
1925200 - Monitoring Alert icon is missing on the workload in Topology view
1925262 - apiserver getting 2 SIGTERM signals which was immediately making it exit code 1
1925319 - bash syntax error in configure-ovs.sh script
1925408 - Remove StatefulSet gatherer and replace it with gathering corresponding config map data
1925516 - Pipeline Metrics Tooltips are overlapping data
1925562 - Add new ArgoCD link from GitOps application environments page
1925596 - Gitops details page image and commit id text overflows past card boundary
1926556 - 'excessive etcd leader changes' test case failing in serial job because prometheus data is wiped by machine set test
1926588 - The tarball of operator-sdk is not ready for ocp4.7
1927456 - 4.7 still points to 4.6 catalog images
1927500 - API server exits non-zero on 2 SIGTERM signals
1929278 - Monitoring workloads using too high a priorityclass
1929645 - Remove openshift:kubevirt-machine-controllers decleration from machine-api
1929920 - Cluster monitoring documentation link is broken - 404 not found
- References:
https://access.redhat.com/security/cve/CVE-2018-10103 https://access.redhat.com/security/cve/CVE-2018-10105 https://access.redhat.com/security/cve/CVE-2018-14461 https://access.redhat.com/security/cve/CVE-2018-14462 https://access.redhat.com/security/cve/CVE-2018-14463 https://access.redhat.com/security/cve/CVE-2018-14464 https://access.redhat.com/security/cve/CVE-2018-14465 https://access.redhat.com/security/cve/CVE-2018-14466 https://access.redhat.com/security/cve/CVE-2018-14467 https://access.redhat.com/security/cve/CVE-2018-14468 https://access.redhat.com/security/cve/CVE-2018-14469 https://access.redhat.com/security/cve/CVE-2018-14470 https://access.redhat.com/security/cve/CVE-2018-14553 https://access.redhat.com/security/cve/CVE-2018-14879 https://access.redhat.com/security/cve/CVE-2018-14880 https://access.redhat.com/security/cve/CVE-2018-14881 https://access.redhat.com/security/cve/CVE-2018-14882 https://access.redhat.com/security/cve/CVE-2018-16227 https://access.redhat.com/security/cve/CVE-2018-16228 https://access.redhat.com/security/cve/CVE-2018-16229 https://access.redhat.com/security/cve/CVE-2018-16230 https://access.redhat.com/security/cve/CVE-2018-16300 https://access.redhat.com/security/cve/CVE-2018-16451 https://access.redhat.com/security/cve/CVE-2018-16452 https://access.redhat.com/security/cve/CVE-2018-20843 https://access.redhat.com/security/cve/CVE-2019-3884 https://access.redhat.com/security/cve/CVE-2019-5018 https://access.redhat.com/security/cve/CVE-2019-6977 https://access.redhat.com/security/cve/CVE-2019-6978 https://access.redhat.com/security/cve/CVE-2019-8625 https://access.redhat.com/security/cve/CVE-2019-8710 https://access.redhat.com/security/cve/CVE-2019-8720 https://access.redhat.com/security/cve/CVE-2019-8743 https://access.redhat.com/security/cve/CVE-2019-8764 https://access.redhat.com/security/cve/CVE-2019-8766 https://access.redhat.com/security/cve/CVE-2019-8769 https://access.redhat.com/security/cve/CVE-2019-8771 https://access.redhat.com/security/cve/CVE-2019-8782 https://access.redhat.com/security/cve/CVE-2019-8783 https://access.redhat.com/security/cve/CVE-2019-8808 https://access.redhat.com/security/cve/CVE-2019-8811 https://access.redhat.com/security/cve/CVE-2019-8812 https://access.redhat.com/security/cve/CVE-2019-8813 https://access.redhat.com/security/cve/CVE-2019-8814 https://access.redhat.com/security/cve/CVE-2019-8815 https://access.redhat.com/security/cve/CVE-2019-8816 https://access.redhat.com/security/cve/CVE-2019-8819 https://access.redhat.com/security/cve/CVE-2019-8820 https://access.redhat.com/security/cve/CVE-2019-8823 https://access.redhat.com/security/cve/CVE-2019-8835 https://access.redhat.com/security/cve/CVE-2019-8844 https://access.redhat.com/security/cve/CVE-2019-8846 https://access.redhat.com/security/cve/CVE-2019-9455 https://access.redhat.com/security/cve/CVE-2019-9458 https://access.redhat.com/security/cve/CVE-2019-11068 https://access.redhat.com/security/cve/CVE-2019-12614 https://access.redhat.com/security/cve/CVE-2019-13050 https://access.redhat.com/security/cve/CVE-2019-13225 https://access.redhat.com/security/cve/CVE-2019-13627 https://access.redhat.com/security/cve/CVE-2019-14889 https://access.redhat.com/security/cve/CVE-2019-15165 https://access.redhat.com/security/cve/CVE-2019-15166 https://access.redhat.com/security/cve/CVE-2019-15903 https://access.redhat.com/security/cve/CVE-2019-15917 https://access.redhat.com/security/cve/CVE-2019-15925 https://access.redhat.com/security/cve/CVE-2019-16167 https://access.redhat.com/security/cve/CVE-2019-16168 https://access.redhat.com/security/cve/CVE-2019-16231 https://access.redhat.com/security/cve/CVE-2019-16233 https://access.redhat.com/security/cve/CVE-2019-16935 https://access.redhat.com/security/cve/CVE-2019-17450 https://access.redhat.com/security/cve/CVE-2019-17546 https://access.redhat.com/security/cve/CVE-2019-18197 https://access.redhat.com/security/cve/CVE-2019-18808 https://access.redhat.com/security/cve/CVE-2019-18809 https://access.redhat.com/security/cve/CVE-2019-19046 https://access.redhat.com/security/cve/CVE-2019-19056 https://access.redhat.com/security/cve/CVE-2019-19062 https://access.redhat.com/security/cve/CVE-2019-19063 https://access.redhat.com/security/cve/CVE-2019-19068 https://access.redhat.com/security/cve/CVE-2019-19072 https://access.redhat.com/security/cve/CVE-2019-19221 https://access.redhat.com/security/cve/CVE-2019-19319 https://access.redhat.com/security/cve/CVE-2019-19332 https://access.redhat.com/security/cve/CVE-2019-19447 https://access.redhat.com/security/cve/CVE-2019-19524 https://access.redhat.com/security/cve/CVE-2019-19533 https://access.redhat.com/security/cve/CVE-2019-19537 https://access.redhat.com/security/cve/CVE-2019-19543 https://access.redhat.com/security/cve/CVE-2019-19602 https://access.redhat.com/security/cve/CVE-2019-19767 https://access.redhat.com/security/cve/CVE-2019-19770 https://access.redhat.com/security/cve/CVE-2019-19906 https://access.redhat.com/security/cve/CVE-2019-19956 https://access.redhat.com/security/cve/CVE-2019-20054 https://access.redhat.com/security/cve/CVE-2019-20218 https://access.redhat.com/security/cve/CVE-2019-20386 https://access.redhat.com/security/cve/CVE-2019-20387 https://access.redhat.com/security/cve/CVE-2019-20388 https://access.redhat.com/security/cve/CVE-2019-20454 https://access.redhat.com/security/cve/CVE-2019-20636 https://access.redhat.com/security/cve/CVE-2019-20807 https://access.redhat.com/security/cve/CVE-2019-20812 https://access.redhat.com/security/cve/CVE-2019-20907 https://access.redhat.com/security/cve/CVE-2019-20916 https://access.redhat.com/security/cve/CVE-2020-0305 https://access.redhat.com/security/cve/CVE-2020-0444 https://access.redhat.com/security/cve/CVE-2020-1716 https://access.redhat.com/security/cve/CVE-2020-1730 https://access.redhat.com/security/cve/CVE-2020-1751 https://access.redhat.com/security/cve/CVE-2020-1752 https://access.redhat.com/security/cve/CVE-2020-1971 https://access.redhat.com/security/cve/CVE-2020-2574 https://access.redhat.com/security/cve/CVE-2020-2752 https://access.redhat.com/security/cve/CVE-2020-2922 https://access.redhat.com/security/cve/CVE-2020-3862 https://access.redhat.com/security/cve/CVE-2020-3864 https://access.redhat.com/security/cve/CVE-2020-3865 https://access.redhat.com/security/cve/CVE-2020-3867 https://access.redhat.com/security/cve/CVE-2020-3868 https://access.redhat.com/security/cve/CVE-2020-3885 https://access.redhat.com/security/cve/CVE-2020-3894 https://access.redhat.com/security/cve/CVE-2020-3895 https://access.redhat.com/security/cve/CVE-2020-3897 https://access.redhat.com/security/cve/CVE-2020-3898 https://access.redhat.com/security/cve/CVE-2020-3899 https://access.redhat.com/security/cve/CVE-2020-3900 https://access.redhat.com/security/cve/CVE-2020-3901 https://access.redhat.com/security/cve/CVE-2020-3902 https://access.redhat.com/security/cve/CVE-2020-6405 https://access.redhat.com/security/cve/CVE-2020-7595 https://access.redhat.com/security/cve/CVE-2020-7774 https://access.redhat.com/security/cve/CVE-2020-8177 https://access.redhat.com/security/cve/CVE-2020-8492 https://access.redhat.com/security/cve/CVE-2020-8563 https://access.redhat.com/security/cve/CVE-2020-8566 https://access.redhat.com/security/cve/CVE-2020-8619 https://access.redhat.com/security/cve/CVE-2020-8622 https://access.redhat.com/security/cve/CVE-2020-8623 https://access.redhat.com/security/cve/CVE-2020-8624 https://access.redhat.com/security/cve/CVE-2020-8647 https://access.redhat.com/security/cve/CVE-2020-8648 https://access.redhat.com/security/cve/CVE-2020-8649 https://access.redhat.com/security/cve/CVE-2020-9327 https://access.redhat.com/security/cve/CVE-2020-9802 https://access.redhat.com/security/cve/CVE-2020-9803 https://access.redhat.com/security/cve/CVE-2020-9805 https://access.redhat.com/security/cve/CVE-2020-9806 https://access.redhat.com/security/cve/CVE-2020-9807 https://access.redhat.com/security/cve/CVE-2020-9843 https://access.redhat.com/security/cve/CVE-2020-9850 https://access.redhat.com/security/cve/CVE-2020-9862 https://access.redhat.com/security/cve/CVE-2020-9893 https://access.redhat.com/security/cve/CVE-2020-9894 https://access.redhat.com/security/cve/CVE-2020-9895 https://access.redhat.com/security/cve/CVE-2020-9915 https://access.redhat.com/security/cve/CVE-2020-9925 https://access.redhat.com/security/cve/CVE-2020-10018 https://access.redhat.com/security/cve/CVE-2020-10029 https://access.redhat.com/security/cve/CVE-2020-10732 https://access.redhat.com/security/cve/CVE-2020-10749 https://access.redhat.com/security/cve/CVE-2020-10751 https://access.redhat.com/security/cve/CVE-2020-10763 https://access.redhat.com/security/cve/CVE-2020-10773 https://access.redhat.com/security/cve/CVE-2020-10774 https://access.redhat.com/security/cve/CVE-2020-10942 https://access.redhat.com/security/cve/CVE-2020-11565 https://access.redhat.com/security/cve/CVE-2020-11668 https://access.redhat.com/security/cve/CVE-2020-11793 https://access.redhat.com/security/cve/CVE-2020-12465 https://access.redhat.com/security/cve/CVE-2020-12655 https://access.redhat.com/security/cve/CVE-2020-12659 https://access.redhat.com/security/cve/CVE-2020-12770 https://access.redhat.com/security/cve/CVE-2020-12826 https://access.redhat.com/security/cve/CVE-2020-13249 https://access.redhat.com/security/cve/CVE-2020-13630 https://access.redhat.com/security/cve/CVE-2020-13631 https://access.redhat.com/security/cve/CVE-2020-13632 https://access.redhat.com/security/cve/CVE-2020-14019 https://access.redhat.com/security/cve/CVE-2020-14040 https://access.redhat.com/security/cve/CVE-2020-14381 https://access.redhat.com/security/cve/CVE-2020-14382 https://access.redhat.com/security/cve/CVE-2020-14391 https://access.redhat.com/security/cve/CVE-2020-14422 https://access.redhat.com/security/cve/CVE-2020-15157 https://access.redhat.com/security/cve/CVE-2020-15503 https://access.redhat.com/security/cve/CVE-2020-15862 https://access.redhat.com/security/cve/CVE-2020-15999 https://access.redhat.com/security/cve/CVE-2020-16166 https://access.redhat.com/security/cve/CVE-2020-24490 https://access.redhat.com/security/cve/CVE-2020-24659 https://access.redhat.com/security/cve/CVE-2020-25211 https://access.redhat.com/security/cve/CVE-2020-25641 https://access.redhat.com/security/cve/CVE-2020-25658 https://access.redhat.com/security/cve/CVE-2020-25661 https://access.redhat.com/security/cve/CVE-2020-25662 https://access.redhat.com/security/cve/CVE-2020-25681 https://access.redhat.com/security/cve/CVE-2020-25682 https://access.redhat.com/security/cve/CVE-2020-25683 https://access.redhat.com/security/cve/CVE-2020-25684 https://access.redhat.com/security/cve/CVE-2020-25685 https://access.redhat.com/security/cve/CVE-2020-25686 https://access.redhat.com/security/cve/CVE-2020-25687 https://access.redhat.com/security/cve/CVE-2020-25694 https://access.redhat.com/security/cve/CVE-2020-25696 https://access.redhat.com/security/cve/CVE-2020-26160 https://access.redhat.com/security/cve/CVE-2020-27813 https://access.redhat.com/security/cve/CVE-2020-27846 https://access.redhat.com/security/cve/CVE-2020-28362 https://access.redhat.com/security/cve/CVE-2020-29652 https://access.redhat.com/security/cve/CVE-2021-2007 https://access.redhat.com/security/cve/CVE-2021-3121 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYDZ+bNzjgjWX9erEAQghXg//awGwjQxJ5LEZWBTdgyuCa8mHEi2rop5T lmebolBMNRSbo9gI8LMSHlvIBBFiV4CuFvfxE0AVLNentfzOTH11TxNWe1KQYt4H EmcGHPeHWTxKDkvAHtVcWXy9WN3y5d4lHSaq6AR1nHRPcj/k1upyx22kotpnYxN8 4d49PjFTO3YbmdYpNLVJ9nY8izqUpTfM7YSyj6ANZSlaYc5Z215o6TPo6e3wobf4 mWu+VfDS0v+/AbGhQhO2sQ7r2ysJ85MB7c62cxck4a51KiA0NKd4xr0TAA4KHnNL ISHFzi5QYXu+meE+9wYRo1ZjJ5fbPj41+1TJbR6O4CbP0xQiFpcUSipNju3rGSGy Ae5G/QGT8J7HzOjlKVvY3SFu/odENR6c+xUIr7IB/FBlu7DdPF2XxMZDQD4DKHEk 4aiDbuiEL3Yf78Ic1RqPPmrj9plIwprVFQz+k3JaQXKD+1dBxO6tk+nVu2/5xNbM uR03hrthYYIpdXLSWU4lzq8j3kQ9wZ4j/m2o6/K6eHNl9PyqAG5jfQv9bVf8E3oG krzc/JLvOfHNEQ/oJs/v/DFDmnAxshCCtGWlpLJ5J0pcD3EePsrPNs1QtQurVrMv RjfBCWKOij53+BinrMKHdsHxfur7GCFCIQCVaLIv6GUjX2NWI0voIVA8JkrFNNp6 McvuEaxco7U= =sw8i -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 8) - aarch64, noarch, ppc64le, s390x, x86_64
- Bugs fixed (https://bugzilla.redhat.com/):
1660798 - NFSv4.2: security label of mount point shows as "unlabeled_t" for ~30 seconds after mounting 1718176 - CVE-2019-12614 kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service 1759052 - CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg 1760100 - CVE-2019-15917 kernel: use-after-free in drivers/bluetooth/hci_ldisc.c 1760310 - CVE-2019-16231 kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c 1760420 - CVE-2019-16233 kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c 1774946 - CVE-2019-19072 kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS 1774963 - CVE-2019-19068 kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS 1774988 - CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c 1775015 - CVE-2019-19063 kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS 1775021 - CVE-2019-19062 kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS 1775097 - CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS 1777418 - CVE-2019-18808 kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c 1777449 - CVE-2019-18809 kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c 1778762 - Please backport Jitter Entropy patches 1779594 - CVE-2019-19332 Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid 1781679 - CVE-2019-19447 kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c 1781810 - CVE-2019-19543 kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c 1783459 - CVE-2019-19524 kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free 1783534 - CVE-2019-19533 kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c 1783561 - CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer 1784130 - CVE-2019-19319 kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c 1786160 - CVE-2019-19767 kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c 1786179 - CVE-2019-19770 kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c 1790063 - CVE-2019-20054 kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c 1802555 - CVE-2020-8649 kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c 1802559 - CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c 1802563 - CVE-2020-8647 kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c 1817718 - CVE-2020-10942 kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field 1819377 - CVE-2019-9458 kernel: use after free due to race condition in the video driver leads to local privilege escalation 1819399 - CVE-2019-9455 kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure 1820402 - Sometimes hit "error: kvm run failed Bad address" when launching a guest on Power8 1822077 - CVE-2020-12826 kernel: possible to send arbitrary signals to a privileged (suidroot) parent process 1823764 - RFE: Enable genfs+xattr labeling for CephFS 1824059 - CVE-2019-20636 kernel: out-of-bounds write via crafted keycode table 1824792 - CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c 1824918 - CVE-2020-11565 kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c 1830280 - Please enable CONFIG_RANDOM_TRUST_CPU 1831399 - CVE-2020-10732 kernel: uninitialized kernel data leak in userspace coredumps 1831699 - CVE-2020-12465 kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c 1832543 - CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata 1832876 - CVE-2020-12659 kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption 1834845 - CVE-2020-12770 kernel: sg_write function lacks an sg_remove_request call in a certain failure case 1839634 - CVE-2020-10751 kernel: SELinux netlink permission check bypass 1844520 - Incorrect pinning of IRQ threads on isolated CPUs by drivers that use cpumask_local_spread() 1846380 - CVE-2020-10773 kernel: kernel stack information leak on s390/s390x 1846964 - CVE-2020-10774 kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features 1853447 - Guest IA32_SPEC_CTRL wrmsr failure on AMD processors that support STIBP but don't support for IBRS 1856588 - Guest crashed and hung when hot unplug vcpus 1860065 - CVE-2020-0305 kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c 1874311 - CVE-2020-14381 kernel: referencing inode of removed superblock in get_futex_key() causes UAF 1881424 - CVE-2020-25641 kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS
6
Show details on source website{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202002-1243",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "14.04"
      },
      {
        "model": "brocade fabric operating system",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "broadcom",
        "version": null
      },
      {
        "model": "active iq unified manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "hci baseboard management controller",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": "h410c"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "8.0"
      },
      {
        "model": "kernel",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "linux",
        "version": "5.5.2"
      },
      {
        "model": "leap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "opensuse",
        "version": "15.1"
      },
      {
        "model": "cloud backup",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "18.04"
      },
      {
        "model": "solidfire baseboard management controller",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "ubuntu linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "canonical",
        "version": "16.04"
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-8648"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ubuntu",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "157489"
      },
      {
        "db": "PACKETSTORM",
        "id": "157485"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-148"
      }
    ],
    "trust": 0.8
  },
  "cve": "CVE-2020-8648",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2020-8648",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.1,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-186773",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2020-8648",
            "impactScore": 5.2,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-8648",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202002-148",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-186773",
            "trust": 0.1,
            "value": "LOW"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-8648",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-186773"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-8648"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-148"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-8648"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c. 7.6) - noarch, x86_64\n\n3. ==========================================================================\nUbuntu Security Notice USN-4345-1\nApril 28, 2020\n\nlinux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp,\nlinux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle,\nlinux-raspi2, linux-snapdragon vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. A local attacker could use this to cause a denial of service (system\ncrash) or execute arbitrary code. (CVE-2020-11884)\n\nIt was discovered that the Intel Wi-Fi driver in the Linux kernel did not\nproperly check for errors in some situations. A local attacker could\npossibly use this to cause a denial of service (system crash). \n(CVE-2019-16234)\n\nTristan Madani discovered that the block I/O tracing implementation in the\nLinux kernel contained a race condition. A local attacker could use this to\ncause a denial of service (system crash) or possibly expose sensitive\ninformation. (CVE-2019-19768)\n\nIt was discovered that the vhost net driver in the Linux kernel contained a\nstack buffer overflow. A local attacker with the ability to perform ioctl()\ncalls on /dev/vhost-net could use this to cause a denial of service (system\ncrash). (CVE-2020-10942)\n\nIt was discovered that the OV51x USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash). \n(CVE-2020-11608)\n\nIt was discovered that the STV06XX USB Camera device driver in the Linux\nkernel did not properly validate device metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash). \n(CVE-2020-11609)\n\nIt was discovered that the Xirlink C-It USB Camera device driver in the\nLinux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). A local attacker could possibly use this\nto cause a denial of service (system crash) or expose sensitive\ninformation. (CVE-2020-8648)\n\nJordy Zomer discovered that the floppy driver in the Linux kernel did not\nproperly check for errors in some situations. A local attacker could\npossibly use this to cause a denial of service (system crash) or possibly\nexpose sensitive information. (CVE-2020-9383)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 18.04 LTS:\n  linux-image-4.15.0-1038-oracle  4.15.0-1038.42\n  linux-image-4.15.0-1058-gke     4.15.0-1058.61\n  linux-image-4.15.0-1059-kvm     4.15.0-1059.60\n  linux-image-4.15.0-1061-raspi2  4.15.0-1061.65\n  linux-image-4.15.0-1066-aws     4.15.0-1066.70\n  linux-image-4.15.0-1077-snapdragon  4.15.0-1077.84\n  linux-image-4.15.0-1080-oem     4.15.0-1080.90\n  linux-image-4.15.0-99-generic   4.15.0-99.100\n  linux-image-4.15.0-99-generic-lpae  4.15.0-99.100\n  linux-image-4.15.0-99-lowlatency  4.15.0-99.100\n  linux-image-aws-lts-18.04       4.15.0.1066.69\n  linux-image-generic             4.15.0.99.89\n  linux-image-generic-lpae        4.15.0.99.89\n  linux-image-gke                 4.15.0.1058.62\n  linux-image-gke-4.15            4.15.0.1058.62\n  linux-image-kvm                 4.15.0.1059.59\n  linux-image-lowlatency          4.15.0.99.89\n  linux-image-oem                 4.15.0.1080.84\n  linux-image-oracle-lts-18.04    4.15.0.1038.47\n  linux-image-powerpc-e500mc      4.15.0.99.89\n  linux-image-powerpc-smp         4.15.0.99.89\n  linux-image-powerpc64-emb       4.15.0.99.89\n  linux-image-powerpc64-smp       4.15.0.99.89\n  linux-image-raspi2              4.15.0.1061.59\n  linux-image-snapdragon          4.15.0.1077.80\n  linux-image-virtual             4.15.0.99.89\n\nUbuntu 16.04 LTS:\n  linux-image-4.15.0-1038-oracle  4.15.0-1038.42~16.04.1\n  linux-image-4.15.0-1061-gcp     4.15.0-1061.65\n  linux-image-4.15.0-1066-aws     4.15.0-1066.70~16.04.1\n  linux-image-4.15.0-1082-azure   4.15.0-1082.92~16.04.1\n  linux-image-4.15.0-99-generic   4.15.0-99.100~16.04.1\n  linux-image-4.15.0-99-generic-lpae  4.15.0-99.100~16.04.1\n  linux-image-4.15.0-99-lowlatency  4.15.0-99.100~16.04.1\n  linux-image-aws-hwe             4.15.0.1066.66\n  linux-image-azure               4.15.0.1082.81\n  linux-image-azure-edge          4.15.0.1082.81\n  linux-image-gcp                 4.15.0.1061.75\n  linux-image-generic-hwe-16.04   4.15.0.99.106\n  linux-image-generic-lpae-hwe-16.04  4.15.0.99.106\n  linux-image-gke                 4.15.0.1061.75\n  linux-image-lowlatency-hwe-16.04  4.15.0.99.106\n  linux-image-oem                 4.15.0.99.106\n  linux-image-oracle              4.15.0.1038.31\n  linux-image-virtual-hwe-16.04   4.15.0.99.106\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. Description:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.2.4 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability\nengineers face as they work across a range of public and private cloud\nenvironments. \nClusters and applications are all visible and managed from a single\nconsole\u2014with security policy built in. See\nthe following Release Notes documentation, which will be updated shortly\nfor\nthis release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.2/html/release_notes/\n\nSecurity fixes:\n\n* redisgraph-tls: redis: integer overflow when configurable limit for\nmaximum supported bulk input size is too big on 32-bit platforms\n(CVE-2021-21309)\n\n* console-header-container: nodejs-netmask: improper input validation of\noctal input data (CVE-2021-28092)\n\n* console-container: nodejs-is-svg: ReDoS via malicious string\n(CVE-2021-28918)\n\nBug fixes: \n\n* RHACM 2.2.4 images (BZ# 1957254)\n\n* Enabling observability for OpenShift Container Storage with RHACM 2.2 on\nOCP 4.7 (BZ#1950832)\n\n* ACM Operator should support using the default route TLS (BZ# 1955270)\n\n* The scrolling bar for search filter does not work properly (BZ# 1956852)\n\n* Limits on Length of MultiClusterObservability Resource Name (BZ# 1959426)\n\n* The proxy setup in install-config.yaml is not worked when IPI installing\nwith RHACM (BZ# 1960181)\n\n* Unable to make SSH connection to a Bitbucket server (BZ# 1966513)\n\n* Observability Thanos store shard crashing - cannot unmarshall DNS message\n(BZ# 1967890)\n\n3. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):\n\n1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms\n1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string\n1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data\n1950832 - Enabling observability for OpenShift Container Storage with RHACM 2.2 on OCP 4.7\n1952150 - [DDF] It would be great to see all the options available for the bucket configuration and which attributes are mandatory\n1954506 - [DDF] Table does not contain data about 20 clusters. Now it\u0027s difficult to estimate CPU usage with larger clusters\n1954535 - Reinstall Submariner - No endpoints found on one cluster\n1955270 - ACM Operator should support using the default route TLS\n1956852 - The scrolling bar for search filter does not work properly\n1957254 - RHACM 2.2.4 images\n1959426 - Limits on Length of MultiClusterObservability Resource Name\n1960181 - The proxy setup in install-config.yaml is not worked when IPI installing with RHACM. \n1963128 - [DDF] Please rename this to \"Amazon Elastic Kubernetes Service\"\n1966513 - Unable to make SSH connection to a Bitbucket server\n1967357 - [DDF] When I clicked on this yaml, I get a HTTP 404 error. \n1967890 - Observability Thanos store shard crashing - cannot unmarshal DNS message\n\n5. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. \n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in\ndrivers/tty/n_tty.c (CVE-2020-8648)\n\n* kernel: Improper input validation in some Intel(R) Graphics Drivers\n(CVE-2020-12363)\n\n* kernel: Null pointer dereference in some Intel(R) Graphics Drivers\n(CVE-2020-12364)\n\n* kernel: Speculation on pointer arithmetic against bpf_context pointer\n(CVE-2020-27170)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* kernel crash when call the timer function\n(sctp_generate_proto_unreach_event) of sctp module (BZ#1707184)\n\n* SCSI error handling process on HP P440ar controller gets stuck\nindefinitely in device reset operation (BZ#1830268)\n\n* netfilter: reproducible deadlock on nft_log module autoload (BZ#1858329)\n\n* netfilter: NULL pointer dereference in nf_tables_set_lookup()\n(BZ#1873171)\n\n* [DELL EMC 7.9 Bug]: No acpi_pad threads on top command for \"power cap\npolicy equal to 0 watts\" (BZ#1883174)\n\n* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e\ndriver causes a use after free condition of the kmalloc-4096 slab cache. \n(BZ#1886003)\n\n* netxen driver performs poorly with RT kernel (BZ#1894274)\n\n* gendisk-\u003edisk_part_tbl-\u003elast_lookup retains pointer after partition\ndeletion (BZ#1898596)\n\n* Kernel experiences panic in update_group_power() due to division error\neven with Bug 1701115 fix (BZ#1910763)\n\n* RHEL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path\n(BZ#1917839)\n\n* RHEL7.9 - mm/THP: do not access vma-\u003evm_mm after calling handle_userfault\n(BZ#1917840)\n\n* raid: wrong raid io account (BZ#1927106)\n\n* qla2x00_status_cont_entry() missing upstream patch that prevents\nunnecessary ABRT/warnings (BZ#1933784)\n\n* RHEL 7.9.z - System hang caused by workqueue stall in qla2xxx driver\n(BZ#1937945)\n\n* selinux: setsebool can trigger a deadlock (BZ#1939091)\n\n* [Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on\nHyper-V (BZ#1941841)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. Bugs fixed (https://bugzilla.redhat.com/):\n\n1802559 - CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c\n1922249 - CVE-2021-3347 kernel: Use after free via PI futex state\n1930246 - CVE-2020-12362 kernel: Integer overflow in Intel(R) Graphics Drivers\n1930249 - CVE-2020-12363 kernel: Improper input validation in some Intel(R) Graphics Drivers\n1930251 - CVE-2020-12364 kernel: Null pointer dereference in some Intel(R) Graphics Drivers\n1940627 - CVE-2020-27170 kernel: Speculation on pointer arithmetic against bpf_context pointer\n1941841 - [Hyper-V][RHEL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nkernel-3.10.0-1160.31.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.31.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.31.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nSource:\nkernel-3.10.0-1160.31.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.31.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.31.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nkernel-3.10.0-1160.31.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.31.1.el7.noarch.rpm\n\nppc64:\nbpftool-3.10.0-1160.31.1.el7.ppc64.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debug-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-devel-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-headers-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-tools-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-1160.31.1.el7.ppc64.rpm\nperf-3.10.0-1160.31.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\npython-perf-3.10.0-1160.31.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\n\nppc64le:\nbpftool-3.10.0-1160.31.1.el7.ppc64le.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debug-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-devel-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-headers-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-tools-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-1160.31.1.el7.ppc64le.rpm\nperf-3.10.0-1160.31.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\npython-perf-3.10.0-1160.31.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\n\ns390x:\nbpftool-3.10.0-1160.31.1.el7.s390x.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-debug-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-devel-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-headers-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-kdump-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-1160.31.1.el7.s390x.rpm\nperf-3.10.0-1160.31.1.el7.s390x.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm\npython-perf-3.10.0-1160.31.1.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.s390x.rpm\n\nx86_64:\nbpftool-3.10.0-1160.31.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nbpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-1160.31.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64.rpm\n\nppc64le:\nbpftool-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-1160.31.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.ppc64le.rpm\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nkernel-3.10.0-1160.31.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.31.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.31.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-3.10.0-1160.31.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.31.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: OpenShift Container Platform 4.7.0 security, bug fix, and enhancement update\nAdvisory ID:       RHSA-2020:5633-01\nProduct:           Red Hat OpenShift Enterprise\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2020:5633\nIssue date:        2021-02-24\nCVE Names:         CVE-2018-10103 CVE-2018-10105 CVE-2018-14461 \n                   CVE-2018-14462 CVE-2018-14463 CVE-2018-14464 \n                   CVE-2018-14465 CVE-2018-14466 CVE-2018-14467 \n                   CVE-2018-14468 CVE-2018-14469 CVE-2018-14470 \n                   CVE-2018-14553 CVE-2018-14879 CVE-2018-14880 \n                   CVE-2018-14881 CVE-2018-14882 CVE-2018-16227 \n                   CVE-2018-16228 CVE-2018-16229 CVE-2018-16230 \n                   CVE-2018-16300 CVE-2018-16451 CVE-2018-16452 \n                   CVE-2018-20843 CVE-2019-3884 CVE-2019-5018 \n                   CVE-2019-6977 CVE-2019-6978 CVE-2019-8625 \n                   CVE-2019-8710 CVE-2019-8720 CVE-2019-8743 \n                   CVE-2019-8764 CVE-2019-8766 CVE-2019-8769 \n                   CVE-2019-8771 CVE-2019-8782 CVE-2019-8783 \n                   CVE-2019-8808 CVE-2019-8811 CVE-2019-8812 \n                   CVE-2019-8813 CVE-2019-8814 CVE-2019-8815 \n                   CVE-2019-8816 CVE-2019-8819 CVE-2019-8820 \n                   CVE-2019-8823 CVE-2019-8835 CVE-2019-8844 \n                   CVE-2019-8846 CVE-2019-9455 CVE-2019-9458 \n                   CVE-2019-11068 CVE-2019-12614 CVE-2019-13050 \n                   CVE-2019-13225 CVE-2019-13627 CVE-2019-14889 \n                   CVE-2019-15165 CVE-2019-15166 CVE-2019-15903 \n                   CVE-2019-15917 CVE-2019-15925 CVE-2019-16167 \n                   CVE-2019-16168 CVE-2019-16231 CVE-2019-16233 \n                   CVE-2019-16935 CVE-2019-17450 CVE-2019-17546 \n                   CVE-2019-18197 CVE-2019-18808 CVE-2019-18809 \n                   CVE-2019-19046 CVE-2019-19056 CVE-2019-19062 \n                   CVE-2019-19063 CVE-2019-19068 CVE-2019-19072 \n                   CVE-2019-19221 CVE-2019-19319 CVE-2019-19332 \n                   CVE-2019-19447 CVE-2019-19524 CVE-2019-19533 \n                   CVE-2019-19537 CVE-2019-19543 CVE-2019-19602 \n                   CVE-2019-19767 CVE-2019-19770 CVE-2019-19906 \n                   CVE-2019-19956 CVE-2019-20054 CVE-2019-20218 \n                   CVE-2019-20386 CVE-2019-20387 CVE-2019-20388 \n                   CVE-2019-20454 CVE-2019-20636 CVE-2019-20807 \n                   CVE-2019-20812 CVE-2019-20907 CVE-2019-20916 \n                   CVE-2020-0305 CVE-2020-0444 CVE-2020-1716 \n                   CVE-2020-1730 CVE-2020-1751 CVE-2020-1752 \n                   CVE-2020-1971 CVE-2020-2574 CVE-2020-2752 \n                   CVE-2020-2922 CVE-2020-3862 CVE-2020-3864 \n                   CVE-2020-3865 CVE-2020-3867 CVE-2020-3868 \n                   CVE-2020-3885 CVE-2020-3894 CVE-2020-3895 \n                   CVE-2020-3897 CVE-2020-3898 CVE-2020-3899 \n                   CVE-2020-3900 CVE-2020-3901 CVE-2020-3902 \n                   CVE-2020-6405 CVE-2020-7595 CVE-2020-7774 \n                   CVE-2020-8177 CVE-2020-8492 CVE-2020-8563 \n                   CVE-2020-8566 CVE-2020-8619 CVE-2020-8622 \n                   CVE-2020-8623 CVE-2020-8624 CVE-2020-8647 \n                   CVE-2020-8648 CVE-2020-8649 CVE-2020-9327 \n                   CVE-2020-9802 CVE-2020-9803 CVE-2020-9805 \n                   CVE-2020-9806 CVE-2020-9807 CVE-2020-9843 \n                   CVE-2020-9850 CVE-2020-9862 CVE-2020-9893 \n                   CVE-2020-9894 CVE-2020-9895 CVE-2020-9915 \n                   CVE-2020-9925 CVE-2020-10018 CVE-2020-10029 \n                   CVE-2020-10732 CVE-2020-10749 CVE-2020-10751 \n                   CVE-2020-10763 CVE-2020-10773 CVE-2020-10774 \n                   CVE-2020-10942 CVE-2020-11565 CVE-2020-11668 \n                   CVE-2020-11793 CVE-2020-12465 CVE-2020-12655 \n                   CVE-2020-12659 CVE-2020-12770 CVE-2020-12826 \n                   CVE-2020-13249 CVE-2020-13630 CVE-2020-13631 \n                   CVE-2020-13632 CVE-2020-14019 CVE-2020-14040 \n                   CVE-2020-14381 CVE-2020-14382 CVE-2020-14391 \n                   CVE-2020-14422 CVE-2020-15157 CVE-2020-15503 \n                   CVE-2020-15862 CVE-2020-15999 CVE-2020-16166 \n                   CVE-2020-24490 CVE-2020-24659 CVE-2020-25211 \n                   CVE-2020-25641 CVE-2020-25658 CVE-2020-25661 \n                   CVE-2020-25662 CVE-2020-25681 CVE-2020-25682 \n                   CVE-2020-25683 CVE-2020-25684 CVE-2020-25685 \n                   CVE-2020-25686 CVE-2020-25687 CVE-2020-25694 \n                   CVE-2020-25696 CVE-2020-26160 CVE-2020-27813 \n                   CVE-2020-27846 CVE-2020-28362 CVE-2020-29652 \n                   CVE-2021-2007 CVE-2021-3121 \n=====================================================================\n\n1. Summary:\n\nRed Hat OpenShift Container Platform release 4.7.0 is now available. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. \n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.7.0. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2020:5634\n\nSpace precludes documenting all of the container images in this advisory. \nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n  $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.0-x86_64\n\nThe image digest is\nsha256:d74b1cfa81f8c9cc23336aee72d8ae9c9905e62c4874b071317a078c316f8a70\n\n(For s390x architecture)\n\n  $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.0-s390x\n\nThe image digest is\nsha256:a68ca03d87496ddfea0ac26b82af77231583a58a7836b95de85efe5e390ad45d\n\n(For ppc64le architecture)\n\n  $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.0-ppc64le\n\nThe image digest is\nsha256:bc7b04e038c8ff3a33b827f4ee19aa79b26e14c359a7dcc1ced9f3b58e5f1ac6\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -between-minor.html#understanding-upgrade-channels_updating-cluster-between\n- -minor. \n\nSecurity Fix(es):\n\n* crewjam/saml: authentication bypass in saml authentication\n(CVE-2020-27846)\n\n* golang: crypto/ssh: crafted authentication request can lead to nil\npointer dereference (CVE-2020-29652)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index\nvalidation (CVE-2021-3121)\n\n* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)\n\n* kubernetes: Secret leaks in kube-controller-manager when using vSphere\nProvider (CVE-2020-8563)\n\n* containernetworking/plugins: IPv6 router advertisements allow for MitM\nattacks on IPv4 clusters (CVE-2020-10749)\n\n* heketi: gluster-block volume password details available in logs\n(CVE-2020-10763)\n\n* golang.org/x/text: possibility to trigger an infinite loop in\nencoding/unicode could lead to crash (CVE-2020-14040)\n\n* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)\n\n* golang-github-gorilla-websocket: integer overflow leads to denial of\nservice (CVE-2020-27813)\n\n* golang: math/big: panic during recursive division of very large numbers\n(CVE-2020-28362)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n3. Solution:\n\nFor OpenShift Container Platform 4.7, see the following documentation,\nwhich\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -cli.html. \n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1620608 - Restoring deployment config with history leads to weird state\n1752220 - [OVN] Network Policy fails to work when project label gets overwritten\n1756096 - Local storage operator should implement must-gather spec\n1756173 - /etc/udev/rules.d/66-azure-storage.rules missing from initramfs\n1768255 - installer reports 100% complete but failing components\n1770017 - Init containers restart when the exited container is removed from node. \n1775057 - [MSTR-485] Cluster is abnormal after etcd backup/restore when the backup is conducted during etcd encryption is migrating\n1775444 - RFE: k8s cpu manager does not restrict /usr/bin/pod cpuset\n1777038 - Cluster scaled beyond host subnet limits does not fire alert or cleanly report why it cannot scale\n1777224 - InfraID in metadata.json and .openshift_install_state.json is not consistent when repeating `create` commands\n1784298 - \"Displaying with reduced resolution due to large dataset.\" would show under some conditions\n1785399 - Under condition of heavy pod creation, creation fails with \u0027error reserving pod name ...: name is reserved\"\n1797766 - Resource Requirements\" specDescriptor fields - CPU and Memory injects empty string YAML editor\n1801089 - [OVN] Installation failed and monitoring pod not created due to some network error. \n1805025 - [OSP] Machine status doesn\u0027t become \"Failed\" when creating a machine with invalid image\n1805639 - Machine status should be \"Failed\" when creating a machine with invalid machine configuration\n1806000 - CRI-O failing with: error reserving ctr name\n1806915 - openshift-service-ca: Some core components are in openshift.io/run-level 1 and are bypassing SCC, but should not be\n1806917 - openshift-service-ca-operator: Some core components are in openshift.io/run-level 1 and are bypassing SCC, but should not be\n1810438 - Installation logs are not gathered from OCP nodes\n1812085 - kubernetes-networking-namespace-pods dashboard doesn\u0027t exist\n1812412 - Monitoring Dashboard: on restricted cluster, query timed out in expression evaluation\n1813012 - EtcdDiscoveryDomain no longer needed\n1813949 - openshift-install doesn\u0027t use env variables for OS_* for some of API endpoints\n1816812 - OpenShift test suites are not resilient to rate limited registries (like docker.io) and cannot control their dependencies for offline use\n1819053 - loading OpenAPI spec for \"v1beta1.metrics.k8s.io\" failed with: OpenAPI spec does not exist\n1819457 - Package Server is in \u0027Cannot update\u0027 status despite properly working\n1820141 - [RFE] deploy qemu-quest-agent on the nodes\n1822744 - OCS Installation CI test flaking\n1824038 - Integration Tests: StaleElementReferenceError in OLM single-installmode scenario\n1825892 - StorageClasses and PVs are not cleaned completely after running the csi verification tool\n1826301 - Wrong NodeStatus reports in file-integrity scan when configuration error in aide.conf file\n1829723 - User workload monitoring alerts fire out of the box\n1832968 - oc adm catalog mirror does not mirror the index image itself\n1833012 - Lower OVNKubernetes HTTP E/W performance compared with OpenShiftSDN\n1833220 - CVE-2020-10749 containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters\n1834995 - olmFull suite always fails once th suite is run on the same cluster\n1836017 - vSphere UPI: Both Internal and External load balancers for kube-apiserver should use /readyz\n1837953 - Replacing masters doesn\u0027t work for ovn-kubernetes 4.4\n1838352 - OperatorExited, Pending marketplace-operator-... pod for several weeks\n1838751 - [oVirt][Tracker] Re-enable skipped network tests\n1839239 - csi-snapshot-controller flickers Degraded=True on etcd hiccups\n1840759 - [aws-ebs-csi-driver] The volume created by aws ebs csi driver can not be deleted when the cluster is destroyed\n1841039 - authentication-operator: Add e2e test for password grants to Keycloak being set as OIDC IdP\n1841119 - Get rid of config patches and pass flags directly to kcm\n1841175 - When an Install Plan gets deleted, OLM does not create a new one\n1841381 - Issue with memoryMB validation\n1841885 - oc adm catalog mirror command attempts to pull from registry.redhat.io when using --from-dir option\n1844727 - Etcd container leaves grep and lsof zombie processes\n1845387 - CVE-2020-10763 heketi: gluster-block volume password details available in logs\n1847074 - Filter bar layout issues at some screen widths on search page\n1848358 - CRDs with preserveUnknownFields:true don\u0027t reflect in status that they are non-structural\n1849543 - [4.5]kubeletconfig\u0027s description will show multiple lines for finalizers when upgrade from 4.4.8-\u003e4.5\n1851103 - Use of NetworkManager-wait-online.service in rhcos-growpart.service\n1851203 - [GSS] [RFE] Need a simpler representation of capactiy breakdown in total usage and per project breakdown in OCS 4 dashboard\n1851351 - OCP 4.4.9: EtcdMemberIPMigratorDegraded: rpc error: code = Canceled desc = grpc: the client connection is closing\n1851693 - The `oc apply` should return errors instead of hanging there when failing to create the CRD\n1852289 - Upgrade testsuite fails on ppc64le environment - Unsupported LoadBalancer service\n1853115 - the restriction of --cloud option should be shown in help text. \n1853116 - `--to` option does not work with `--credentials-requests` flag. \n1853352 - [v2v][UI] Storage Class fields Should  Not be empty  in VM  disks view\n1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash\n1854567 - \"Installed Operators\" list showing \"duplicated\" entries during installation\n1855325 - [Feature:Prometheus][Conformance] Prometheus when installed on the cluster [Top Level] [Feature:Prometheus][Conformance] Prometheus when installed on the cluster should report telemetry if a cloud.openshift.com token is present\n1855351 - Inconsistent Installer reactions to Ctrl-C during user input process\n1855408 - OVN cluster unstable after running minimal scale test\n1856351 - Build page should show metrics for when the build ran, not the last 30 minutes\n1856354 - New APIServices missing from OpenAPI definitions\n1857446 - ARO/Azure: excessive pod memory allocation causes node lockup\n1857877 - Operator upgrades can delete existing CSV before completion\n1858578 - [v2v] [ui] VM import RHV to CNV Target VM Name longer than 63 chars should not be allowed\n1859174 - [IPI][OSP] Having errors from 4.3 to 4.6 about Security group rule already created\n1860136 - default ingress does not propagate annotations to route object on update\n1860322 - [OCPv4.5.2] after unexpected shutdown one of RHV Hypervisors, OCP worker nodes machine are marked as \"Failed\"\n1860518 - unable to stop a crio pod\n1861383 - Route with `haproxy.router.openshift.io/timeout: 365d` kills the ingress controller\n1862430 - LSO: PV creation lock should not be acquired in a loop\n1862489 - LSO autoprovisioning should exclude top level disks that are part of LVM volume group. \n1862608 - Virtual media does not work on hosts using BIOS, only UEFI\n1862918 - [v2v] User should only select SRIOV network when importin vm with SRIOV network\n1865743 - Some pods are stuck in ContainerCreating and some sdn pods are in CrashLoopBackOff\n1865839 - rpm-ostree fails with \"System transaction in progress\" when moving to kernel-rt\n1866043 - Configurable table column headers can be illegible\n1866087 - Examining agones helm chart resources results in \"Oh no!\"\n1866261 - Need to indicate the intentional behavior for Ansible in the `create api` help info\n1866298 - [RHOCS Usability Study][Installation] Labeling the namespace should be a part of the installation flow or be clearer as a requirement\n1866320 - [RHOCS Usability Study][Dashboard] Users were confused by Available Capacity and the Total Capacity\n1866334 - [RHOCS Usability Study][Installation] On the Operator installation page, there\u2019s no indication on which labels offer tooltip/help\n1866340 - [RHOCS Usability Study][Dashboard] It was not clear why \u201cNo persistent storage alerts\u201d was prominently displayed\n1866343 - [RHOCS Usability Study][Dashboard] User wanted to know the time frame for Data Consumption, e.g I/O Operations\n1866445 - kola --basic-qemu-scenarios scenario fail on ppc64le \u0026 s390x\n1866482 - Few errors are seen when oc adm must-gather is run\n1866605 - No metadata.generation set for build and buildconfig objects\n1866873 - MCDDrainError \"Drain failed on  , updates may be blocked\" missing rendered node name\n1866901 - Deployment strategy for BMO allows multiple pods to run at the same time\n1866925 - openshift-install destroy cluster should fail quickly when provided with invalid credentials on Azure. \n1867165 - Cannot assign static address to baremetal install bootstrap vm\n1867380 - When using webhooks in OCP 4.5 fails to rollout latest deploymentconfig\n1867400 - [OCs 4.5]UI should not allow creation of second storagecluster of different mode in a single OCS\n1867477 - HPA monitoring cpu utilization fails for deployments which have init containers\n1867518 - [oc] oc should not print so many goroutines when ANY command fails\n1867608 - ds/machine-config-daemon takes 100+ minutes to rollout on  250 node cluster\n1867965 - OpenShift Console Deployment Edit overwrites deployment yaml\n1868004 - opm index add appears to produce image with wrong registry server binary\n1868065 - oc -o jsonpath prints possible warning / bug \"Unable to decode server response into a Table\"\n1868104 - Baremetal actuator should not delete Machine objects\n1868125 - opm index add is not creating an index with valid images when --permissive flag is added, the index is empty instead\n1868384 - CLI does not save login credentials as expected when using the same username in multiple clusters\n1868527 - OpenShift Storage using VMWare vSAN receives error \"Failed to add disk \u0027scsi0:2\u0027\" when mounted pod is created on separate node\n1868645 - After a disaster recovery pods a stuck in \"NodeAffinity\" state and not running\n1868748 - ClusterProvisioningIP in baremetal platform has wrong JSON annotation\n1868765 - [vsphere][ci] could not reserve an IP address: no available addresses\n1868770 - catalogSource named \"redhat-operators\" deleted in a disconnected cluster\n1868976 - Prometheus error opening query log file on EBS backed PVC\n1869293 - The configmap name looks confusing in aide-ds pod logs\n1869606 - crio\u0027s failing to delete a network namespace\n1870337 - [sig-storage] Managed cluster should have no crashlooping recycler pods over four minutes\n1870342 - [sig-scheduling] SchedulerPredicates [Serial] validates resource limits of pods that are allowed to run  [Conformance]\n1870373 - Ingress Operator reports available when DNS fails to provision\n1870467 - D/DC Part of Helm / Operator Backed should not have HPA\n1870728 - openshift-install creates expired ignition files from stale .openshift_install_state.json\n1870800 - [4.6] Managed Column not appearing on Pods Details page\n1871170 - e2e tests are needed to validate the functionality of the etcdctl container\n1872001 - EtcdDiscoveryDomain no longer needed\n1872095 - content are expanded to the whole line when only one column in table on Resource Details page\n1872124 - Could not choose device type as \"disk\" or \"part\" when create localvolumeset from web console\n1872128 - Can\u0027t run container with hostPort on ipv6 cluster\n1872166 - \u0027Silences\u0027 link redirects to unexpected \u0027Alerts\u0027 view after creating a silence in the Developer perspective\n1872251 - [aws-ebs-csi-driver] Verify job in CI doesn\u0027t check for vendor dir sanity\n1872786 - Rules in kube-apiserver.rules are taking too long and consuming too much memory for Prometheus to evaluate them\n1872821 - [DOC] Typo in Ansible Operator Tutorial\n1872907 - Fail to create CR from generated Helm Base Operator\n1872923 - Click \"Cancel\" button on the \"initialization-resource\" creation form page should send users to the \"Operator details\" page instead of \"Install Operator\" page (previous page)\n1873007 - [downstream] failed to read config when running the operator-sdk in the home path\n1873030 - Subscriptions without any candidate operators should cause resolution to fail\n1873043 - Bump to latest available 1.19.x k8s\n1873114 - Nodes goes into NotReady state (VMware)\n1873288 - Changing Cluster-Wide Pull Secret Does Not Trigger Updates In Kubelet Filesystem\n1873305 - Failed to power on /inspect node when using Redfish protocol\n1873326 - Accessibility - The symbols e.g checkmark in the overview page has no text description, label, or other accessible information\n1873480 - Accessibility - No text description, alt text, label, or other accessible information associated with the help icon: \u201c?\u201d button/icon in Developer Console -\u003eNavigation\n1873556 - [Openstack] HTTP_PROXY setting for NetworkManager-resolv-prepender not working\n1873593 - MCO fails to cope with ContainerRuntimeConfig thas has a name \u003e 63 characters\n1874057 - Pod stuck in CreateContainerError - error msg=\"container_linux.go:348: starting container process caused \\\"chdir to cwd (\\\\\\\"/mount-point\\\\\\\") set in config.json failed: permission denied\\\"\"\n1874074 - [CNV] Windows 2019 Default Template Not Defaulting to Proper NIC/Storage Driver\n1874192 - [RFE] \"Create Backing Store\" page doesn\u0027t allow to select already defined k8s secret as target bucket credentials when Google Cloud Storage is selected as a provider\n1874240 - [vsphere] unable to deprovision - Runtime error list attached objects\n1874248 - Include validation for vcenter host in the install-config\n1874340 - vmware: NodeClockNotSynchronising alert is triggered in openshift cluster after upgrading form 4.4.16 to 4.5.6\n1874583 - apiserver tries and fails to log an event when shutting down\n1874584 - add retry for etcd errors in kube-apiserver\n1874638 - Missing logging for nbctl daemon\n1874736 - [downstream] no version info for the helm-operator\n1874901 - add utm_source parameter to Red Hat Marketplace URLs for attribution\n1874968 - Accessibility: The project selection drop down is a keyboard trap\n1875247 - Dependency resolution error \"found more than one head for channel\" is unhelpful for users\n1875516 - disabled scheduling is easy to miss in node page of OCP console\n1875598 - machine status is Running for a master node which has been terminated from the console\n1875806 - When creating a service of type \"LoadBalancer\" (Kuryr,OVN) communication through this loadbalancer failes after 2-5 minutes. \n1876166 - need to be able to disable kube-apiserver connectivity checks\n1876469 - Invalid doc link on yaml template schema description\n1876701 - podCount specDescriptor change doesn\u0027t take effect on operand details page\n1876815 - Installer uses the environment variable OS_CLOUD for manifest generation despite explicit prompt\n1876935 - AWS volume snapshot is not deleted after the cluster is destroyed\n1877071 - vSphere IPI - Nameserver limits were exceeded, some nameservers have been omitted\n1877105 - add redfish to enabled_bios_interfaces\n1877116 - e2e aws calico tests fail with `rpc error: code = ResourceExhausted`\n1877273 - [OVN] EgressIP cannot fail over to available nodes after one egressIP node shutdown\n1877648 - [sriov]VF from allocatable and capacity of node is incorrect when the policy is only \u0027rootDevices\u0027\n1877681 - Manually created PV can not be used\n1877693 - dnsrecords specify recordTTL as 30 but the value is null in AWS Route 53\n1877740 - RHCOS unable to get ip address during first boot\n1877812 - [ROKS] IBM cloud failed to terminate OSDs when upgraded between internal builds of OCS 4.5\n1877919 - panic in multus-admission-controller\n1877924 - Cannot set BIOS config using Redfish with Dell iDracs\n1878022 - Met imagestreamimport error when import the whole image repository\n1878086 - OCP 4.6+OCS 4.6(multiple SC) Internal Mode- UI should populate the default \"Filesystem Name\" instead of providing a textbox, \u0026 the name should be validated\n1878301 - [4.6] [UI] Unschedulable used to always be displayed when Node is Ready status\n1878701 - After deleting and recreating a VM with same name, the VM events contain the events from the old VM\n1878766 - CPU consumption on nodes is higher than the CPU count of the node. \n1878772 - On the nodes there are up to 547 zombie processes caused by thanos and Prometheus. \n1878823 - \"oc adm release mirror\" generating incomplete imageContentSources when using \"--to\" and \"--to-release-image\"\n1878845 - 4.5 to 4.6.rc.4 upgrade failure: authentication operator health check connection refused for multitenant mode\n1878900 - Installer complains about not enough vcpu for the baremetal flavor where generic bm flavor is being used\n1878953 - RBAC error shows when normal user access pvc upload page\n1878956 - `oc api-resources` does not include API version\n1878972 - oc adm release mirror removes the architecture information\n1879013 - [RFE]Improve CD-ROM interface selection\n1879056 - UI should allow to change or unset the evictionStrategy\n1879057 - [CSI Certificate Test] Test failed for CSI certification tests for CSIdriver openshift-storage.rbd.csi.ceph.com with RWX enabled\n1879094 - RHCOS dhcp kernel parameters not working as expected\n1879099 - Extra reboot during 4.5 -\u003e 4.6 upgrade\n1879244 - Error adding container to network \"ipvlan-host-local\": \"master\" field is required\n1879248 - OLM Cert Dir for Webhooks does not align SDK/Kubebuilder\n1879282 - Update OLM references to point to the OLM\u0027s new doc site\n1879283 - panic after nil pointer dereference in pkg/daemon/update.go\n1879365 - Overlapping, divergent openshift-cluster-storage-operator manifests\n1879419 - [RFE]Improve boot source description for \u0027Container\u0027 and \u2018URL\u2019\n1879430 - openshift-object-counts quota is not dynamically updating as the resource is deleted. \n1879565 - IPv6 installation fails on node-valid-hostname\n1879777 - Overlapping, divergent openshift-machine-api namespace manifests\n1879878 - Messages flooded in thanos-querier pod- oauth-proxy container: Authorization header does not start with \u0027Basic\u0027, skipping basic authentication in Log message in thanos-querier pod the oauth-proxy\n1879930 - Annotations shouldn\u0027t be removed during object reconciliation\n1879976 - No other channel visible from console\n1880068 - image pruner is not aware of image policy annotation, StatefulSets, etc. \n1880148 - dns daemonset rolls out slowly in large clusters\n1880161 - Actuator Update calls should have fixed retry time\n1880259 - additional network + OVN network installation failed\n1880389 - Pipeline Runs with skipped Tasks incorrectly show Tasks as \"Failed\"\n1880410 - Convert Pipeline Visualization node to SVG\n1880417 - [vmware] Fail to boot with Secure Boot enabled, kernel lockdown denies iopl access to afterburn\n1880443 - broken machine pool management on OpenStack\n1880450 - Host failed to install because its installation stage joined took longer than expected 20m0s. \n1880473 - IBM Cloudpak operators installation stuck \"UpgradePending\" with InstallPlan status updates failing due to size limitation\n1880680 - [4.3] [Tigera plugin] - openshift-kube-proxy fails - Failed to execute iptables-restore: exit status 4 (iptables-restore v1.8.4 (nf_tables)\n1880785 - CredentialsRequest missing description in `oc explain`\n1880787 - No description for Provisioning CRD for `oc explain`\n1880902 - need dnsPlocy set in crd ingresscontrollers\n1880913 - [DeScheduler] - change loglevel from Info to Error when priority class given in the descheduler params is not present in the cluster\n1881027 - Cluster installation fails at with error :  the container name \\\"assisted-installer\\\" is already in use\n1881046 - [OSP] openstack-cinder-csi-driver-operator doesn\u0027t contain required manifests and assets\n1881155 - operator install authentication: Authentication require functional ingress which requires at least one schedulable and ready node\n1881268 - Image uploading failed but wizard claim the source is available\n1881322 - kube-scheduler not scheduling pods for certificates not renewed automatically after nodes restoration\n1881347 - [v2v][ui]VM Import Wizard does not call Import provider cleanup\n1881881 - unable to specify target port manually resulting in application not reachable\n1881898 - misalignment of sub-title in quick start headers\n1882022 - [vsphere][ipi] directory path is incomplete, terraform can\u0027t find the cluster\n1882057 - Not able to select access modes for snapshot and clone\n1882140 - No description for spec.kubeletConfig\n1882176 - Master recovery instructions don\u0027t handle IP change well\n1882191 - Installation fails against external resources which lack DNS Subject Alternative Name\n1882209 - [ BateMetal IPI ] local coredns resolution not working\n1882210 - [release 4.7] insights-operator: Fix bug in reflector not recovering from \"Too large resource version\"\n1882268 - [e2e][automation]Add Integration Test for Snapshots\n1882361 - Retrieve and expose the latest report for the cluster\n1882485 - dns-node-resolver corrupts /etc/hosts if internal registry is not in use\n1882556 - git:// protocol in origin tests is not currently proxied\n1882569 - CNO: Replacing masters doesn\u0027t work for ovn-kubernetes 4.4\n1882608 - Spot instance not getting created on AzureGovCloud\n1882630 - Fstype is changed after deleting pv provisioned by localvolumeset instance\n1882649 - IPI installer labels all images it uploads into glance as qcow2\n1882653 - The Approval should display the Manual after the APPROVAL changed to Manual from the Automatic\n1882658 - [RFE] Volume Snapshot is not listed under inventory in Project Details page\n1882660 - Operators in a namespace should be installed together when approve one\n1882667 - [ovn] br-ex Link not found when scale up RHEL worker\n1882723 - [vsphere]Suggested mimimum value for providerspec not working\n1882730 - z systems not reporting correct core count in recording rule\n1882750 - [sig-api-machinery][Feature:APIServer][Late] kubelet terminates kube-apiserver gracefully\n1882781 - nameserver= option to dracut creates extra NM connection profile\n1882785 - Multi-Arch CI Jobs destroy libvirt network but occasionally leave it defined\n1882844 - [IPI on vsphere] Executing \u0027openshift-installer destroy cluster\u0027 leaves installer tag categories in vsphere\n1883371 - CVE-2020-26160 jwt-go: access restriction bypass vulnerability\n1883388 - Bare Metal Hosts Details page doesn\u0027t show Mainitenance and Power On/Off status\n1883422 - operator-sdk cleanup fail after installing operator with \"run bundle\" without installmode and og with ownnamespace\n1883425 - Gather top installplans and their count\n1883502 - Logging is broken due to mix of k8s.io/klog v1 and v2\n1883523 - [sig-cli] oc adm must-gather runs successfully for audit logs [Suite:openshift/conformance/parallel]\n1883538 - must gather report \"cannot file manila/aws ebs/ovirt csi related namespaces and objects\" error\n1883560 - operator-registry image needs clean up in /tmp\n1883563 - Creating duplicate namespace from create namespace modal breaks the UI\n1883614 - [OCP 4.6] [UI] UI should not describe power cycle as \"graceful\"\n1883642 - [sig-imageregistry][Feature:ImageTriggers][Serial] ImageStream admission TestImageStreamAdmitSpecUpdate\n1883660 - e2e-metal-ipi CI job consistently failing on 4.4\n1883765 - [user workload monitoring] improve latency of Thanos sidecar  when streaming read requests\n1883766 - [e2e][automation] Adjust tests for UI changes\n1883768 - [user workload monitoring] The Prometheus operator should discard invalid TLS configurations\n1883773 - opm alpha bundle build fails on win10 home\n1883790 - revert \"force cert rotation every couple days for development\" in 4.7\n1883803 - node pull secret feature is not working as expected\n1883836 - Jenkins imagestream ubi8 and nodejs12 update\n1883847 - The UI does not show checkbox for enable encryption at rest for OCS\n1883853 - go list -m all does not work\n1883905 - race condition in opm index add --overwrite-latest\n1883946 - Understand why trident CSI pods are getting deleted by OCP\n1884035 - Pods are illegally transitioning back to pending\n1884041 - e2e should provide error info when minimum number of pods aren\u0027t ready in kube-system namespace\n1884131 - oauth-proxy repository should run tests\n1884165 - Repos should be disabled in -firstboot.service before OS extensions are applied\n1884221 - IO becomes unhealthy due to a file change\n1884258 - Node network alerts should work on ratio rather than absolute values\n1884270 - Git clone does not support SCP-style ssh locations\n1884334 - CVO marks an upgrade as failed when an operator takes more than 20 minutes to rollout\n1884435 - vsphere - loopback is randomly not being added to resolver\n1884565 - oauth-proxy crashes on invalid usage\n1884584 - Kuryr controller continuously restarting due to unable to clean up Network Policy\n1884613 - Create Instance of Prometheus from operator returns blank page for non cluster-admin users\n1884628 - ovs-configuration service fails when the external network is configured on a tagged vlan on top of a bond device on a baremetal IPI deployment\n1884629 - Visusally impaired user using screen reader not able to select Admin/Developer console options in drop down menu. \n1884632 - Adding BYOK disk encryption through DES\n1884654 - Utilization of a VMI is not populated\n1884655 - KeyError on self._existing_vifs[port_id]\n1884664 - Operator install page shows \"installing...\" instead of going to install status page\n1884672 - Failed to inspect hardware. Reason: unable to start inspection: \u0027idrac\u0027\n1884691 - Installer blocks cloud-credential-operator manual mode on GCP and Azure\n1884724 - Quick Start: Serverless quickstart doesn\u0027t match Operator install steps\n1884739 - Node process segfaulted\n1884824 - Update baremetal-operator libraries to k8s 1.19\n1885002 - network kube-rbac-proxy scripts crashloop rather than non-crash looping\n1885138 - Wrong detection of pending state in VM details\n1885151 - [Cloud Team - Cluster API Provider Azure] Logging is broken due to mix of k8s.io/klog v1 and v2\n1885165 - NoRunningOvnMaster alert falsely triggered\n1885170 - Nil pointer when verifying images\n1885173 - [e2e][automation] Add test for next run configuration feature\n1885179 - oc image append fails on push (uploading a new layer)\n1885213 - Vertical Pod Autoscaler (VPA) not working with DeploymentConfig\n1885218 - [e2e][automation] Add virtctl to gating script\n1885223 - Sync with upstream (fix panicking cluster-capacity binary)\n1885235 - Prometheus: Logging is broken due to mix of k8s.io/klog v1 and v2\n1885241 - kube-rbac-proxy: Logging is broken due to mix of k8s.io/klog v1 and v2\n1885243 - prometheus-adapter: Logging is broken due to mix of k8s.io/klog v1 and v2\n1885244 - prometheus-operator: Logging is broken due to mix of k8s.io/klog v1 and v2\n1885246 - cluster-monitoring-operator: Logging is broken due to mix of k8s.io/klog v1 and v2\n1885249 - openshift-state-metrics: Logging is broken due to mix of k8s.io/klog v1 and v2\n1885308 - Supermicro nodes failed to boot via disk during installation when using IPMI and UEFI\n1885315 - unit tests fail on slow disks\n1885319 - Remove redundant use of group and kind of DataVolumeTemplate\n1885343 - Console doesn\u0027t load in iOS Safari when using self-signed certificates\n1885344 - 4.7 upgrade - dummy bug for 1880591\n1885358 - add p\u0026f configuration to protect openshift traffic\n1885365 - MCO does not respect the install section of systemd files when enabling\n1885376 - failed to initialize the cluster: Cluster operator marketplace is still updating\n1885398 - CSV with only Webhook conversion can\u0027t be installed\n1885403 - Some OLM events hide the underlying errors\n1885414 - Need to disable HTX when not using HTTP/2 in order to preserve HTTP header name case\n1885425 - opm index add cannot batch add multiple bundles that use skips\n1885543 - node tuning operator builds and installs an unsigned RPM\n1885644 - Panic output due to timeouts in openshift-apiserver\n1885676 - [OCP 4.7]UI should fallback to minimal deployment only after total CPU \u003c 30 || totalMemory \u003c 72 GiB for initial deployment\n1885702 - Cypress:  Fix \u0027aria-hidden-focus\u0027 accesibility violations\n1885706 - Cypress:  Fix \u0027link-name\u0027 accesibility violation\n1885761 - DNS fails to resolve in some pods\n1885856 - Missing registry v1 protocol usage metric on telemetry\n1885864 - Stalld service crashed under the worker node\n1885930 - [release 4.7] Collect ServiceAccount statistics\n1885940 - kuryr/demo image ping not working\n1886007 - upgrade test with service type load balancer will never work\n1886022 - Move range allocations to CRD\u0027s\n1886028 - [BM][IPI] Failed to delete node after scale down\n1886111 - UpdatingopenshiftStateMetricsFailed: DeploymentRollout of openshift-monitoring/openshift-state-metrics: got 1 unavailable replicas\n1886134 - Need to set GODEBUG=x509ignoreCN=0 in initrd\n1886154 - System roles are not present while trying to create new role binding through web console\n1886166 - 1885517 Clone - Not needed for 4.7 - upgrade from 4.5-\u003e4.6 causes broadcast storm\n1886168 - Remove Terminal Option for Windows Nodes\n1886200 - greenwave / CVP is failing on bundle validations, cannot stage push\n1886229 - Multipath support for RHCOS sysroot\n1886294 - Unable to schedule a pod due to Insufficient ephemeral-storage\n1886327 - Attempt to add a worker using bad roodDeviceHint: bmh and machine become Provisioned, no error in status\n1886353 - [e2e][automation] kubevirt-gating job fails for a missing virtctl URL\n1886397 - Move object-enum to console-shared\n1886423 - New Affinities don\u0027t contain ID until saving\n1886435 - Azure UPI uses deprecated command \u0027group deployment\u0027\n1886449 - p\u0026f: add configuration to protect oauth server traffic\n1886452 - layout options doesn\u0027t gets selected style on click i.e grey background\n1886462 - IO doesn\u0027t recognize namespaces - 2 resources with the same name in 2 namespaces -\u003e only 1 gets collected\n1886488 - move e2e test off of nfs image from docker.io/gmontero/nfs-server:latest\n1886524 - Change default terminal command for Windows Pods\n1886553 - i/o timeout experienced from build02 when targeting CI test cluster during test execution\n1886600 - panic: assignment to entry in nil map\n1886620 - Application behind service load balancer with PDB is not disrupted\n1886627 - Kube-apiserver pods restarting/reinitializing periodically\n1886635 - CVE-2020-8563 kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider\n1886636 - Panic in machine-config-operator\n1886749 - Removing network policy from namespace causes inability to access pods through loadbalancer. \n1886751 - Gather MachineConfigPools\n1886766 - PVC dropdown has \u0027Persistent Volume\u0027 Label\n1886834 - ovn-cert is mandatory in both master and node daemonsets\n1886848 - [OSP] machine instance-state annotation discrepancy with providerStatus.instanceState\n1886861 - ordered-values.yaml not honored if values.schema.json provided\n1886871 - Neutron ports created for hostNetworking pods\n1886890 - Overwrite jenkins-agent-base imagestream\n1886900 - Cluster-version operator fills logs with \"Manifest: ...\" spew\n1886922 - [sig-network] pods should successfully create sandboxes by getting pod\n1886973 - Local storage operator doesn\u0027t include correctly populate LocalVolumeDiscoveryResult in console\n1886977 - [v2v]Incorrect VM Provider type displayed in UI while importing VMs through VMIO\n1887010 - Imagepruner met error \"Job has reached the specified backoff limit\" which causes image registry degraded\n1887026 - FC volume attach fails with \u201cno fc disk found\u201d error on OCP 4.6 PowerVM cluster\n1887040 - [upgrade] ovs pod crash for rhel worker when upgarde from 4.5 to 4.6\n1887046 - Event for LSO need update to avoid confusion\n1887088 - cluster-node-tuning-operator refers to missing cluster-node-tuned image\n1887375 - User should be able to specify volumeMode when creating pvc from web-console\n1887380 - Unsupported access mode should not be available to select when creating pvc by aws-ebs-csi-driver(gp2-csi) from web-console\n1887392 - openshift-apiserver: delegated authn/z should have ttl \u003e metrics/healthz/readyz/openapi interval\n1887428 - oauth-apiserver service should be monitored by prometheus\n1887441 - ingress misconfiguration may break authentication but ingress operator keeps reporting \"degraded: False\"\n1887454 - [sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext4)] volumes should store data\n1887456 - It is impossible to attach the default NIC to a bridge with the latest version of OVN Kubernetes\n1887465 - Deleted project is still referenced\n1887472 - unable to edit application group for KSVC via gestures (shift+Drag)\n1887488 - OCP 4.6:  Topology Manager OpenShift E2E test fails:  gu workload attached to SRIOV networks should let resource-aligned PODs have working SRIOV network interface\n1887509 - Openshift-tests conformance TopologyManager tests run when Machine Config Operator is not installed on cluster\n1887525 - Failures to set master HardwareDetails cannot easily be debugged\n1887545 - 4.5 to 4.6 upgrade fails when external network is configured on a bond device: ovs-configuration service fails and node becomes unreachable\n1887585 - ovn-masters stuck in crashloop after scale test\n1887651 - [Internal Mode] Object gateway (RGW) in unknown state after OCP upgrade. \n1887737 - Test TestImageRegistryRemovedWithImages is failing on e2e-vsphere-operator\n1887740 - cannot install descheduler operator after uninstalling it\n1887745 - API server is throwing 5xx error code for 42.11% of requests for LIST events\n1887750 - `oc explain localvolumediscovery` returns empty description\n1887751 - `oc explain localvolumediscoveryresult` returns empty description\n1887778 - Add ContainerRuntimeConfig gatherer\n1887783 - PVC upload cannot continue after approve the certificate\n1887797 - [CNV][V2V] Default network type is bridge for interface bound to POD network in VMWare migration wizard\n1887799 - User workload monitoring prometheus-config-reloader OOM\n1887850 - [sig-auth][Feature:SCC][Early] should not have pod creation failures during install test is flaky\n1887863 - Installer panics on invalid flavor\n1887864 - Clean up dependencies to avoid invalid scan flagging\n1887934 - TestForwardedHeaderPolicyAppend, TestForwardedHeaderPolicyReplace, and TestForwardedHeaderPolicyIfNone consistently fail because of case-sensitive comparison\n1887936 - Kube-scheduler should be able to parse v1beta1 KubeSchedulerConfig\n1888015 - workaround kubelet graceful termination of static pods bug\n1888028 - prevent extra cycle in aggregated apiservers\n1888036 - Operator details shows old CRD versions\n1888041 - non-terminating pods are going from running to pending\n1888072 - Setting Supermicro node to PXE boot via Redfish doesn\u0027t take affect\n1888073 - Operator controller continuously busy looping\n1888118 - Memory requests not specified for image registry operator\n1888150 - Install Operand Form on OperatorHub is displaying unformatted text\n1888172 - PR 209 didn\u0027t update the sample archive, but machineset and pdbs are now namespaced\n1888227 - Failed to deploy some of container image on the recent OCP 4.6 nightly build\n1888292 - Fix CVE-2015-7501 affecting agent-maven-3.5\n1888311 - p\u0026f: make SAR traffic from oauth and openshift apiserver exempt\n1888363 - namespaces crash in dev\n1888378 - [IPI on Azure] errors destroying cluster when Azure resource group was never created\n1888381 - instance:node_network_receive_bytes_excluding_lo:rate1m value twice expected\n1888464 - installer missing permission definitions for TagResources and UntagResources when installing in existing VPC\n1888494 - imagepruner pod is error when image registry storage is not configured\n1888565 - [OSP] machine-config-daemon-firstboot.service failed with \"error reading osImageURL from rpm-ostree\"\n1888595 - cluster-policy-controller logs shows error which reads initial monitor sync has error\n1888601 - The poddisruptionbudgets is using the operator service account, instead of gather\n1888657 - oc doesn\u0027t know its name\n1888663 - sdn starts after kube-apiserver, delay readyz until oauth-apiserver is reachable\n1888671 - Document the Cloud Provider\u0027s ignore-volume-az setting\n1888738 - quay.io/openshift/origin-must-gather:latest is not a multi-arch, manifest-list image\n1888763 - at least one of these parameters (Vendor, DeviceID or PfNames) has to be defined in nicSelector in CR %s\", cr.GetName()\n1888827 - ovnkube-master may segfault when trying to add IPs to a nil address set\n1888861 - need to pass dual-stack service CIDRs to kube-apiserver in dual-stack cluster\n1888866 - AggregatedAPIDown permanently firing after removing APIService\n1888870 - JS error when using autocomplete in YAML editor\n1888874 - hover message are not shown for some properties\n1888900 - align plugins versions\n1888985 - Cypress:  Fix \u0027Ensures buttons have discernible text\u0027 accesibility violation\n1889213 - The error message of uploading failure is not clear enough\n1889267 - Increase the time out for creating template and upload image in the terraform\n1889348 - Project link should be removed from Application Details page, since it is inaccurate (Application Stages)\n1889374 - Kiali feature won\u0027t work on fresh 4.6 cluster\n1889388 - ListBundles returns incorrect replaces/skips when bundles have been added via semver-skippatch mode\n1889420 - OCP failed to add vsphere disk when pod moved to new node during cluster upgrade\n1889515 - Accessibility - The symbols e.g checkmark in the Node \u003e overview page has no text description, label, or other accessible information\n1889529 - [Init-CR annotation] Inline alert shows operand instance was needed still appearing after creating an Operand instance\n1889540 - [4.5 upgrade][alert]CloudCredentialOperatorDown\n1889577 - Resources are not shown on project workloads page\n1889620 - [Azure] - Machineset not scaling when publicIP:true in disconnected Azure enviroment\n1889630 - Scheduling disabled popovers are missing for Node status in Node Overview and Details pages\n1889692 - Selected Capacity is showing wrong size\n1889694 - usbguard fails to install as RHCOS extension due to missing libprotobuf.so.15\n1889698 - When the user clicked cancel at the Create Storage Class confirmation dialog all the data from the Local volume set goes off\n1889710 - Prometheus metrics on disk take more space compared to OCP 4.5\n1889721 - opm index add semver-skippatch mode does not respect prerelease versions\n1889724 - When LocalVolumeDiscovery CR is created form the LSO page User doesn\u0027t see the Disk tab\n1889767 - [vsphere] Remove certificate from upi-installer image\n1889779 - error when destroying a vSphere installation that failed early\n1889787 - OCP is flooding the oVirt engine with auth errors\n1889838 - race in Operator update after fix from bz1888073\n1889852 - support new AWS regions ap-east-1, af-south-1, eu-south-1\n1889863 - Router prints incorrect log message for namespace label selector\n1889891 - Backport timecache LRU fix\n1889912 - Drains can cause high CPU usage\n1889921 - Reported Degraded=False Available=False pair does not make sense\n1889928 - [e2e][automation] Add more tests for golden os\n1889943 - EgressNetworkPolicy does not work when setting Allow rule to a dnsName\n1890038 - Infrastructure status.platform not migrated to status.platformStatus causes warnings\n1890074 - MCO extension kernel-headers is invalid\n1890104 - with Serverless 1.10 version of trigger/subscription/channel/IMC is V1 as latest\n1890130 - multitenant mode consistently fails CI\n1890141 - move off docker.io images for build/image-eco/templates/jenkins e2e\n1890145 - The mismatched of font size for Status Ready and Health Check secondary text\n1890180 - FieldDependency x-descriptor doesn\u0027t support non-sibling fields\n1890182 - DaemonSet with existing owner garbage collected\n1890228 - AWS: destroy stuck on route53 hosted zone not found\n1890235 - e2e: update Protractor\u0027s checkErrors logging\n1890250 - workers may fail to join the cluster during an update from 4.5\n1890256 - Replacing a master node on a baremetal IPI deployment gets stuck when deleting the machine of the unhealthy member\n1890270 - External IP doesn\u0027t work if the IP address is not assigned to a node\n1890361 - s390x: Generate new ostree rpm with fix for rootfs immutability\n1890456 - [vsphere] mapi_instance_create_failed doesn\u0027t work on vsphere\n1890467 - unable to edit an application without a service\n1890472 - [Kuryr] Bulk port creation exception not completely formatted\n1890494 - Error assigning Egress IP on GCP\n1890530 - cluster-policy-controller doesn\u0027t gracefully terminate\n1890630 - [Kuryr] Available port count not correctly calculated for alerts\n1890671 - [SA] verify-image-signature using service account does not work\n1890677 - \u0027oc image info\u0027 claims \u0027does not exist\u0027 for application/vnd.oci.image.manifest.v1+json manifest\n1890808 - New etcd alerts need to be added to the monitoring stack\n1890951 - Mirror of multiarch images together with cluster logging case problems. It doesn\u0027t sync the \"overall\" sha it syncs only the sub arch sha. \n1890984 - Rename operator-webhook-config to sriov-operator-webhook-config\n1890995 - wew-app should provide more insight into why image deployment failed\n1891023 - ovn-kubernetes rbac proxy never starts waiting for an incorrect API call\n1891047 - Helm chart fails to install using developer console because of TLS certificate error\n1891068 - [sig-instrumentation] Prometheus when installed on the cluster shouldn\u0027t report any alerts in firing state apart from Watchdog and AlertmanagerReceiversNotConfigured [Early] failing due to TargetDown alert from kube-scheduler\n1891080 - [LSO] When Localvolumeset and SC is already created before OCS install Creation of LVD and LVS is skipped when user click created storage cluster from UI\n1891108 - p\u0026f: Increase the concurrency share of workload-low priority level\n1891143 - CVO deadlocked while shutting down, shortly after fresh cluster install (metrics goroutine)\n1891189 - [LSO] max device limit is accepting negative values. PVC is not getting created and no error is shown\n1891314 - Display incompatible helm charts for installation (kubeVersion of cluster doesn\u0027t meet requirements of chart)\n1891362 - Wrong metrics count for openshift_build_result_total\n1891368 - fync should be fsync for etcdHighFsyncDurations alert\u0027s annotations.message\n1891374 - fync should be fsync for etcdHighFsyncDurations critical alert\u0027s annotations.message\n1891376 - Extra text in Cluster Utilization charts\n1891419 - Wrong detail head on network policy detail page. \n1891459 - Snapshot tests should report stderr of failed commands\n1891498 - Other machine config pools do not show during update\n1891543 - OpenShift 4.6/OSP install fails when node flavor has less than 25GB, even with dedicated storage\n1891551 - Clusterautoscaler doesn\u0027t scale up as expected\n1891552 - Handle missing labels as empty. \n1891555 - The windows oc.exe binary does not have version metadata\n1891559 - kuryr-cni cannot start new thread\n1891614 - [mlx] testpmd fails inside OpenShift pod using DevX version 19.11\n1891625 - [Release 4.7] Mutable LoadBalancer Scope\n1891702 - installer get pending when additionalTrustBundle is added into  install-config.yaml\n1891716 - OVN cluster upgrade from 4.6.1 to 4.7 fails\n1891740 - OperatorStatusChanged is noisy\n1891758 - the authentication operator may spam DeploymentUpdated event endlessly\n1891759 - Dockerfile builds cannot change /etc/pki/ca-trust\n1891816 - [UPI] [OSP] control-plane.yml provisioning playbook fails on OSP 16.1\n1891825 - Error message not very informative in case of mode mismatch\n1891898 - The ClusterServiceVersion can define Webhooks that cannot be created. \n1891951 - UI should show warning while creating pools with compression on\n1891952 - [Release 4.7] Apps Domain Enhancement\n1891993 - 4.5 to 4.6 upgrade doesn\u0027t remove deployments created by marketplace\n1891995 - OperatorHub displaying old content\n1891999 - Storage efficiency card showing wrong compression ratio\n1892004 - OCP 4.6 opm on Ubuntu 18.04.4 - error /lib/x86_64-linux-gnu/libc.so.6: version `GLIBC_2.28\u0027 not found (required by ./opm)\n1892167 - [SR-IOV] SriovNetworkNodePolicies apply ignoring the spec.nodeSelector. \n1892198 - TypeError in \u0027Performance Profile\u0027 tab displayed for \u0027Performance Addon Operator\u0027\n1892288 - assisted install workflow creates excessive control-plane disruption\n1892338 - HAProxyReloadFail alert only briefly fires in the event of a broken HAProxy config\n1892358 - [e2e][automation] update feature gate for kubevirt-gating job\n1892376 - Deleted netnamespace could not be re-created\n1892390 - TestOverwrite/OverwriteBundle/DefaultBehavior in operator-registry is flaky\n1892393 - TestListPackages is flaky\n1892448 - MCDPivotError alert/metric missing\n1892457 - NTO-shipped stalld needs to use FIFO for boosting. \n1892467 - linuxptp-daemon crash\n1892521 - [AWS] Startup bootstrap machine failed due to ignition file is missing in disconnected UPI env\n1892653 - User is unable to create KafkaSource with v1beta\n1892724 - VFS added to the list of devices of the nodeptpdevice CRD\n1892799 - Mounting additionalTrustBundle in the operator\n1893117 - Maintenance mode on vSphere blocks installation. \n1893351 - TLS secrets are not able to edit on console. \n1893362 - The ovs-xxxxx_openshift-sdn container does not terminate gracefully, slowing down reboots\n1893386 - false-positive ReadyIngressNodes_NoReadyIngressNodes: Auth operator makes risky \"worker\" assumption when guessing about ingress availability\n1893546 - Deploy using virtual media fails on node cleaning step\n1893601 - overview filesystem utilization of OCP is showing the wrong values\n1893645 - oc describe route SIGSEGV\n1893648 - Ironic image building process is not compatible with UEFI secure boot\n1893724 - OperatorHub generates incorrect RBAC\n1893739 - Force deletion doesn\u0027t work for snapshots if snapshotclass is already deleted\n1893776 - No useful metrics for image pull time available, making debugging issues there impossible\n1893798 - Lots of error messages starting with \"get namespace to enqueue Alertmanager instances failed\" in the logs of prometheus-operator\n1893832 - ErrorCount field is missing in baremetalhosts.metal3.io CRD\n1893889 - disabled dropdown items in the pf dropdown component are skipped over and unannounced by JAWS\n1893926 - Some \"Dynamic PV (block volmode)\" pattern storage e2e tests are wrongly skipped\n1893944 - Wrong product name for Multicloud Object Gateway\n1893953 - (release-4.7) Gather default StatefulSet configs\n1893956 - Installation always fails at \"failed to initialize the cluster: Cluster operator image-registry is still updating\"\n1893963 - [Testday] Workloads-\u003e Virtualization is not loading for Firefox browser\n1893972 - Should skip e2e test cases as early as possible\n1894013 - [v2v][Testday] VMware to CNV VM import]VMware URL: It is not clear that only the FQDN/IP address is required without \u0027https://\u0027\n1894020 - User with edit users cannot deploy images from their own namespace from the developer perspective\n1894025 - OCP 4.5 to 4.6 upgrade for \"aws-ebs-csi-driver-operator\" fails when \"defaultNodeSelector\" is set\n1894041 - [v2v][[Testday]VM import from VMware/RHV] VM import wizard: The target storage class name is not displayed if default storage class is used. \n1894065 - tag new packages to enable TLS support\n1894110 - Console shows wrong value for maxUnavailable and maxSurge when set to 0\n1894144 - CI runs of baremetal IPI are failing due to newer libvirt libraries\n1894146 - ironic-api used by metal3 is over provisioned and consumes a lot of RAM\n1894194 - KuryrPorts leftovers from 4.6 GA need to be deleted\n1894210 - Failed to encrypt OSDs on OCS4.6 installation (via UI)\n1894216 - Improve OpenShift Web Console availability\n1894275 - Fix CRO owners file to reflect node owner\n1894278 - \"database is locked\" error when adding bundle to index image\n1894330 - upgrade channels needs to be updated for 4.7\n1894342 - oauth-apiserver logs many \"[SHOULD NOT HAPPEN] failed to update managedFields for ... OAuthClient ... no corresponding type for oauth.openshift.io/v1, Kind=OAuthClient\"\n1894374 - Dont prevent the user from uploading a file with incorrect extension\n1894432 - [oVirt] sometimes installer timeout on tmp_import_vm\n1894477 - bash syntax error in nodeip-configuration.service\n1894503 - add automated test for Polarion CNV-5045\n1894519 - [OSP] External mode cluster creation disabled for Openstack and oVirt platform\n1894539 - [on-prem] Unable to deploy additional machinesets on separate subnets\n1894645 - Cinder volume provisioning crashes on nil cloud provider\n1894677 - image-pruner job is panicking: klog stack\n1894810 - Remove TechPreview Badge from Eventing in Serverless version 1.11.0\n1894860 - \u0027backend\u0027 CI job passing despite failing tests\n1894910 - Update the node to use the real-time kernel fails\n1894992 - All nightly jobs for e2e-metal-ipi failing due to ipa image missing tenacity package\n1895065 - Schema / Samples / Snippets Tabs are all selected at the same time\n1895099 - vsphere-upi and vsphere-upi-serial jobs time out waiting for bootstrap to complete in CI\n1895141 - panic in service-ca injector\n1895147 - Remove memory limits on openshift-dns\n1895169 - VM Template does not properly manage Mount Windows guest tools check box during VM creation\n1895268 - The bundleAPIs should NOT be empty\n1895309 - [OCP v47] The RHEL node scaleup fails due to \"No package matching \u0027cri-o-1.19.*\u0027 found available\" on OCP 4.7 cluster\n1895329 - The infra index filled with warnings \"WARNING: kubernetes.io/cinder built-in volume provider is now deprecated. The Cinder volume provider is deprecated and will be removed in a future release\"\n1895360 - Machine Config Daemon removes a file although its defined in the dropin\n1895367 - Missing image in metadata DB index.db in disconnected Operator Hub installation. OCP 4.6.1\n1895372 - Web console going blank after selecting any operator to install from OperatorHub\n1895385 - Revert KUBELET_LOG_LEVEL back to level 3\n1895423 - unable to edit an application with a custom builder image\n1895430 - unable to edit custom template application\n1895509 - Backup taken on one master cannot be restored on other masters\n1895537 - [sig-imageregistry][Feature:ImageExtract] Image extract should extract content from an image\n1895838 - oc explain description contains \u0027/\u0027\n1895908 - \"virtio\" option is not available when modifying a CD-ROM to disk type\n1895909 - e2e-metal-ipi-ovn-dualstack is failing\n1895919 - NTO fails to load kernel modules\n1895959 - configuring webhook token authentication should prevent cluster upgrades\n1895979 - Unable to get coreos-installer with --copy-network to work\n1896101 - [cnv][automation] Added negative tests for migration from VMWare and RHV\n1896160 - CI: Some cluster operators are not ready: marketplace (missing: Degraded)\n1896188 - [sig-cli] oc debug deployment configs from a build: local-busybox-1-build not completed\n1896218 - Occasional GCP install failures: Error setting IAM policy for project ...: googleapi: Error 400: Service account ... does not exist., badRequest\n1896229 - Current Rate of Bytes Received and Current Rate of Bytes Transmitted data can not be loaded\n1896244 - Found a panic in storage e2e test\n1896296 - Git links should avoid .git as part of the URL and should not link git:// urls in general\n1896302 - [e2e][automation] Fix 4.6 test failures\n1896365 - [Migration]The SDN migration cannot revert under some conditions\n1896384 - [ovirt IPI]: local coredns resolution not working\n1896446 - Git clone from private repository fails after upgrade OCP 4.5 to 4.6\n1896529 - Incorrect instructions in the Serverless operator and application quick starts\n1896645 - documentationBaseURL needs to be updated for 4.7\n1896697 - [Descheduler] policy.yaml param in cluster configmap is empty\n1896704 - Machine API components should honour cluster wide proxy settings\n1896732 - \"Attach to Virtual Machine OS\" button should not be visible on old clusters\n1896866 - File /etc/NetworkManager/system-connections/default_connection.nmconnection  is incompatible with SR-IOV operator\n1896898 - ovs-configuration.service fails when multiple IPv6 default routes are provided via RAs over the same interface and deployment bootstrap fails\n1896918 - start creating new-style Secrets for AWS\n1896923 - DNS pod /metrics exposed on anonymous http port\n1896977 - route SimpleAllocationPlugin: host name validation errors: spec.host: Invalid value: ... must be no more than 63 characters\n1897003 - VNC console cannot be connected after visit it in new window\n1897008 - Cypress: reenable check for \u0027aria-hidden-focus\u0027 rule \u0026 checkA11y test for modals\n1897026 - [Migration] With updating optional network operator configuration, migration stucks on MCO\n1897039 - router pod keeps printing log: template \"msg\"=\"router reloaded\"  \"output\"=\"[WARNING] 316/065823 (15) : parsing [/var/lib/haproxy/conf/haproxy.config:52]: option \u0027http-use-htx\u0027 is deprecated and ignored\n1897050 - [IBM Power] LocalVolumeSet provisions boot partition as PV. \n1897073 - [OCP 4.5] wrong netid assigned to Openshift projects/namespaces\n1897138 - oVirt provider uses depricated cluster-api project\n1897142 - When scaling replicas to zero, Octavia loadbalancer pool members are not updated accordingly\n1897252 - Firing alerts are not showing up in console UI after cluster is up for some time\n1897354 - Operator installation showing success, but Provided APIs are missing\n1897361 - The MCO GCP-OP tests fail consistently on containerruntime tests with \"connection refused\"\n1897412 - [sriov]disableDrain did not be updated in CRD of manifest\n1897423 - Max unavailable and Max surge value are not shown on Deployment Config Details page\n1897516 - Baremetal IPI deployment with IPv6 control plane fails when the nodes obtain both SLAAC and DHCPv6 addresses as they set their hostname to \u0027localhost\u0027\n1897520 - After restarting nodes the image-registry co is in degraded true state. \n1897584 - Add casc plugins\n1897603 - Cinder volume attachment detection failure in Kubelet\n1897604 - Machine API deployment fails: Kube-Controller-Manager can\u0027t reach API: \"Unauthorized\"\n1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers\n1897641 - Baremetal IPI with IPv6 control plane: nodes respond with duplicate packets to ICMP6 echo requests\n1897676 - [CI] [Azure] [UPI] CI failing since 4.6 changes in ignition\n1897830 - [GSS] Unable to deploy OCS 4.5.2 on OCP 4.6.1, cannot `Create OCS Cluster Service`\n1897891 - [RFE][v2v][UI][CNV VM import] Providing error message or/and block migration when vddk-init-image is missing\n1897897 - ptp lose sync openshift 4.6\n1898036 - no network after reboot (IPI)\n1898045 - AWS EBS CSI Driver can not get updated cloud credential secret automatically\n1898097 - mDNS floods the baremetal network\n1898118 - Lack of logs on some image stream tests make hard to find root cause of a problem\n1898134 - Descheduler logs show absolute values instead of percentage when LowNodeUtilization strategy is applied\n1898159 - kcm operator shall pass --allocate-node-cidrs=false to kcm for ovn-kube and openshift-sdn cluster\n1898174 - [OVN] EgressIP does not guard against node IP assignment\n1898194 - GCP: can\u0027t install on custom machine types\n1898238 - Installer validations allow same floating IP for API and Ingress\n1898268 - [OVN]: `make check` broken on 4.6\n1898289 - E2E test: Use KUBEADM_PASSWORD_FILE by default\n1898320 - Incorrect Apostrophe  Translation of  \"it\u0027s\" in Scheduling Disabled Popover\n1898357 - Within the operatorhub details view, long unbroken text strings do not wrap cause breaking display. \n1898407 - [Deployment timing regression] Deployment takes longer with 4.7\n1898417 - GCP: the dns targets in Google Cloud DNS is not updated after recreating loadbalancer service\n1898487 - [oVirt] Node is not removed when VM has been removed from oVirt engine\n1898500 - Failure to upgrade operator when a Service is included in a Bundle\n1898517 - Ironic auto-discovery may result in rogue nodes registered in ironic\n1898532 - Display names defined in specDescriptors not respected\n1898580 - When adding more than one node selector to the sriovnetworknodepolicy, the cni and the device plugin pods are constantly rebooted\n1898613 - Whereabouts should exclude IPv6 ranges\n1898655 - [oVirt] Node deleted in oVirt should cause the Machine to go into a Failed phase\n1898679 - Operand creation form - Required \"type: object\" properties (Accordion component) are missing red asterisk\n1898680 - CVE-2020-7774 nodejs-y18n: prototype pollution vulnerability\n1898745 - installation failing with CVO reporting openshift-samples not rolled out, samples not setting versions in its ClusterOperator\n1898839 - Wrong YAML in operator metadata\n1898851 - Multiple Pods access the same volume on the same node e2e test cases are missed from aws ebs csi driver e2e test job\n1898873 - Remove TechPreview Badge from Monitoring\n1898954 - Backup script does not take /etc/kubernetes/static-pod-resources on a reliable way\n1899111 - [RFE] Update jenkins-maven-agen to maven36\n1899128 - VMI details screen -\u003e show the warning that it is preferable to have a VM only if the VM actually does not exist\n1899175 - bump the RHCOS boot images for 4.7\n1899198 - Use new packages for ipa ramdisks\n1899200 - In Installed Operators page I cannot search for an Operator by it\u0027s name\n1899220 - Support AWS IMDSv2\n1899350 - configure-ovs.sh doesn\u0027t configure bonding options\n1899433 - When Creating OCS from ocs wizard Step Discover Disks shows Error \"An error occurred Not Found\"\n1899459 - Failed to start monitoring pods once the operator removed from override list of CVO\n1899515 - Passthrough credentials are not immediately re-distributed on update\n1899575 - update discovery burst to reflect lots of CRDs on openshift clusters\n1899582 - update discovery burst to reflect lots of CRDs on openshift clusters\n1899588 - Operator objects are re-created after all other associated resources have been deleted\n1899600 - Increased etcd fsync latency as of OCP 4.6\n1899603 - workers-rhel7 CI jobs failing: Failed to remove rollback: error running rpm-ostree cleanup\n1899627 - Project dashboard Active status using small icon\n1899725 - Pods table does not wrap well with quick start sidebar open\n1899746 - [ovn] error while waiting on flows for pod: OVS sandbox port is no longer active (probably due to a subsequent CNI ADD)\n1899760 - etcd_request_duration_seconds_bucket metric has excessive cardinality\n1899835 - catalog-operator repeatedly crashes with \"runtime error: index out of range [0] with length 0\"\n1899839 - thanosRuler.resources.requests does not take effect in user-workload-monitoring-config confimap\n1899853 - additionalSecurityGroupIDs not working for master nodes\n1899922 - NP changes sometimes influence new pods. \n1899949 - [Platform] Remove restriction on disk type selection for LocalVolumeSet\n1900008 - Fix internationalized sentence fragments in ImageSearch.tsx\n1900010 - Fix internationalized sentence fragments in BuildImageSelector.tsx\n1900020 - Remove \u0026apos; from internationalized keys\n1900022 - Search Page - Top labels field is not applied to selected Pipeline resources\n1900030 - disruption_tests: [sig-imageregistry] Image registry remain available failing consistently\n1900126 - Creating a VM results in suggestion to create a default storage class when one already exists\n1900138 - [OCP on RHV] Remove insecure mode from the installer\n1900196 - stalld is not restarted after crash\n1900239 - Skip \"subPath should be able to unmount\" NFS test\n1900322 - metal3 pod\u0027s toleration for key: node-role.kubernetes.io/master currently matches on exact value matches but should match on Exists\n1900377 - [e2e][automation] create new css selector for active users\n1900496 - (release-4.7) Collect spec config for clusteroperator resources\n1900672 - (s390x) Upgrade from old LUKS to new not working with DASD disks\n1900699 - Impossible to add new Node on OCP 4.6 using large ECKD disks - fdasd issue\n1900759 - include qemu-guest-agent by default\n1900790 - Track all resource counts via telemetry\n1900835 - Multus errors when cachefile is not found\n1900935 - `oc adm release mirror` panic panic: runtime error\n1900989 - accessing the route cannot wake up the idled resources\n1901040 - When scaling down the status of the node is stuck on deleting\n1901057 - authentication operator health check failed when installing a cluster behind proxy\n1901107 - pod donut shows incorrect information\n1901111 - Installer dependencies are broken\n1901200 - linuxptp-daemon crash when enable debug log level\n1901301 - CBO should handle platform=BM without provisioning CR\n1901355 - [Azure][4.7] Invalid vm size from customized compute nodes does not fail properly\n1901363 - High Podready Latency due to timed out waiting for annotations\n1901373 - redundant bracket on snapshot restore button\n1901376 - [on-prem] Upgrade from 4.6 to 4.7 failed with \"timed out waiting for the condition during waitForControllerConfigToBeCompleted: controllerconfig is not completed: ControllerConfig has not completed: completed(false) running(false) failing(true\"\n1901395 - \"Edit virtual machine template\" action link should be removed\n1901472 - [OSP] Bootstrap and master nodes use different keepalived unicast setting\n1901517 - RHCOS 4.6.1 uses a single NetworkManager connection for multiple NICs when using default DHCP\n1901531 - Console returns a blank page while trying to create an operator Custom CR with Invalid Schema\n1901594 - Kubernetes resource CRUD operations.Kubernetes resource CRUD operations Pod \"before all\" hook for \"creates the resource instance\"\n1901604 - CNO blocks editing Kuryr options\n1901675 - [sig-network] multicast when using one of the plugins \u0027redhat/openshift-ovs-multitenant, redhat/openshift-ovs-networkpolicy\u0027 should allow multicast traffic in namespaces where it is enabled\n1901909 - The device plugin pods / cni pod are restarted every 5 minutes\n1901982 - [sig-builds][Feature:Builds] build can reference a cluster service  with a build being created from new-build should be able to run a build that references a cluster service\n1902019 - when podTopologySpreadConstraint strategy is enabled for descheduler it throws error\n1902059 - Wire a real signer for service accout issuer\n1902091 - `cluster-image-registry-operator` pod leaves connections open when fails connecting S3 storage\n1902111 - CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service\n1902157 - The DaemonSet machine-api-termination-handler couldn\u0027t allocate Pod\n1902253 - MHC status doesnt set RemediationsAllowed = 0\n1902299 - Failed to mirror operator catalog - error: destination registry required\n1902545 - Cinder csi driver node pod should add nodeSelector for Linux\n1902546 - Cinder csi driver node pod doesn\u0027t run on master node\n1902547 - Cinder csi driver controller pod doesn\u0027t run on master node\n1902552 - Cinder csi driver does not use the downstream images\n1902595 - Project workloads list view doesn\u0027t show alert icon and hover message\n1902600 - Container csi-snapshotter in Cinder csi driver needs to use ImagePullPolicy=IfNotPresent\n1902601 - Cinder csi driver pods run as BestEffort qosClass\n1902653 - [BM][IPI] Master deployment failed: No valid host was found. Reason: No conductor service registered which supports driver redfish for conductor group\n1902702 - [sig-auth][Feature:LDAP][Serial] ldap group sync can sync groups from ldap: oc cp over non-existing directory/file fails\n1902746 - [BM][IP] Master deployment failed - Base.1.0.GeneralError: database is locked\n1902824 - failed to generate semver informed package manifest: unable to determine default channel\n1902894 - hybrid-overlay-node crashing trying to get node object during initialization\n1902969 - Cannot load vmi detail page\n1902981 - It should default to current namespace when create vm from template\n1902996 - [AWS] UPI on USGov, bootstrap machine can not fetch ignition file  via s3:// URI\n1903033 - duplicated lines of imageContentSources is seen when mirror release image to local registry\n1903034 - OLM continuously printing debug logs\n1903062 - [Cinder csi driver] Deployment mounted volume have no write access\n1903078 - Deleting VolumeSnapshotClass makes VolumeSnapshot not Ready\n1903107 - Enable vsphere-problem-detector e2e tests\n1903164 - OpenShift YAML editor jumps to top every few seconds\n1903165 - Improve Canary Status Condition handling for e2e tests\n1903172 - Column Management: Fix sticky footer on scroll\n1903186 - [Descheduler] cluster logs should report some info when PodTopologySpreadConstraints strategy is enabled\n1903188 - [Descheduler] cluster log reports failed to validate server configuration\" err=\"unsupported log format:\n1903192 - Role name missing on create role binding form\n1903196 - Popover positioning is misaligned for Overview Dashboard status items\n1903206 - Ingress controller incorrectly routes traffic to non-ready pods/backends. \n1903226 - MutatingWebhookConfiguration pod-identity-webhook does not exclude critical control-plane components\n1903248 - Backport Upstream Static Pod UID patch\n1903277 - Deprovisioning Not Deleting Security Groups [VpcLimitExceeded on e2e-aws tests]\n1903290 - Kubelet repeatedly log the same log line from exited containers\n1903346 - PV backed by FC lun is not being unmounted properly and this leads to IO errors / xfs corruption. \n1903382 - Panic when task-graph is canceled with a TaskNode with no tasks\n1903400 - Migrate a VM which is not running goes to pending state\n1903402 - Nic/Disk on VMI overview should link to VMI\u0027s nic/disk page\n1903414 - NodePort is not working when configuring an egress IP address\n1903424 - mapi_machine_phase_transition_seconds_sum doesn\u0027t work\n1903464 - \"Evaluating rule failed\" for \"record: cluster:kube_persistentvolumeclaim_resource_requests_storage_bytes:provisioner:sum\" and \"record: cluster:kubelet_volume_stats_used_bytes:provisioner:sum\"\n1903639 - Hostsubnet gatherer produces wrong output\n1903651 - Network Policies are not working as expected with OVN-Kubernetes when traffic hairpins back to the same source through a service\n1903660 - Cannot install with Assisted Installer on top of IPv6 since network provider is not started\n1903674 - [sig-apps] ReplicationController should serve a basic image on each replica with a private image\n1903717 - Handle different Pod selectors for metal3 Deployment\n1903733 - Scale up followed by scale down can delete all running workers\n1903917 - Failed to load \"Developer Catalog\" page\n1903999 - Httplog response code is always zero\n1904026 - The quota controllers should resync on new resources and make progress\n1904064 - Automated cleaning is disabled by default\n1904124 - DHCP to static lease script doesn\u0027t work correctly if starting with infinite leases\n1904125 - Boostrap VM .ign image gets added into \u0027default\u0027 pool instead of \u003ccluster-name\u003e-\u003cid\u003e-bootstrap\n1904131 - kuryr tempest plugin test test_ipblock_network_policy_sg_rules fails\n1904133 - KubeletConfig flooded with failure conditions\n1904161 - AlertmanagerReceiversNotConfigured fires unconditionally on alertmanager restart\n1904243 - RHCOS 4.6.1 missing ISCSI initiatorname.iscsi !\n1904244 - MissingKey errors for two plugins using i18next.t\n1904262 - clusterresourceoverride-operator has version: 1.0.0 every build\n1904296 - VPA-operator has version: 1.0.0 every build\n1904297 - The index image generated by \"opm index prune\" leaves unrelated images\n1904305 - Should have scroll-down bar for the field which the values list has too many results under dashboards\n1904385 - [oVirt] registry cannot mount volume on 4.6.4 -\u003e 4.6.6 upgrade\n1904497 - vsphere-problem-detector: Run on vSphere cloud only\n1904501 - [Descheduler] descheduler does not evict any pod when PodTopologySpreadConstraint strategy is set\n1904502 - vsphere-problem-detector: allow longer timeouts for some operations\n1904503 - vsphere-problem-detector: emit alerts\n1904538 - [sig-arch][Early] Managed cluster should start all core operators: monitoring: container has runAsNonRoot and image has non-numeric user (nobody)\n1904578 - metric scraping for vsphere problem detector is not configured\n1904582 - All application traffic broken due to unexpected load balancer change on 4.6.4 -\u003e 4.6.6 upgrade\n1904663 - IPI pointer customization MachineConfig always generated\n1904679 - [Feature:ImageInfo] Image info should display information about images\n1904683 - `[sig-builds][Feature:Builds] s2i build with a root user image` tests use docker.io image\n1904684 - [sig-cli] oc debug ensure it works with image streams\n1904713 - Helm charts with kubeVersion restriction are filtered incorrectly\n1904776 - Snapshot modal alert is not pluralized\n1904824 - Set vSphere hostname from guestinfo before NM starts\n1904941 - Insights status is always showing a loading icon\n1904973 - KeyError: \u0027nodeName\u0027 on NP deletion\n1904985 - Prometheus and thanos sidecar targets are down\n1904993 - Many ampersand special characters are found in strings\n1905066 - QE - Monitoring test cases - smoke test suite automation\n1905074 - QE -Gherkin linter to maintain standards\n1905100 - Too many haproxy processes in default-router pod causing high load average\n1905104 - Snapshot modal disk items missing keys\n1905115 - CI: dev-scripts fail on 02_configure_host: Failed to start network ostestbm\n1905119 - Race in AWS EBS determining whether custom CA bundle is used\n1905128 - [e2e][automation] e2e tests succeed without actually execute\n1905133 - operator conditions special-resource-operator\n1905141 - vsphere-problem-detector: report metrics through telemetry\n1905146 - Backend Tests: TestHelmRepoGetter_SkipDisabled failures\n1905194 - Detecting broken connections to the Kube API takes up to 15 minutes\n1905221 - CVO transitions from \"Initializing\" to \"Updating\" despite not attempting many manifests\n1905232 - [sig-imageregistry][Feature:ImageAppend] Image append should create images by appending them failing due to inconsistent images between CI and OCP\n1905253 - Inaccurate text at bottom of Events page\n1905298 - openshift-apiserver initContainer fix-audit-permissions is not requesting required resources: cpu, memory\n1905299 - OLM fails to update operator\n1905307 - Provisioning CR is missing from must-gather\n1905319 - cluster-samples-operator containers are not requesting required memory resource\n1905320 - csi-snapshot-webhook is not requesting required memory resource\n1905323 - dns-operator is not requesting required memory resource\n1905324 - ingress-operator is not requesting required memory resource\n1905327 - openshift-kube-scheduler initContainer wait-for-host-port is not requesting required resources: cpu, memory\n1905328 - Changing the bound token service account issuer invalids previously issued bound tokens\n1905329 - openshift-oauth-apiserver initContainer fix-audit-permissions is not requesting required resources: cpu, memory\n1905330 - openshift-monitoring init-textfile is not requesting required resources: cpu, memory\n1905338 - QE -Cypress Automation for Add Flow - Database, Yaml, OperatorBacked, PageDetails\n1905347 - QE - Design Gherkin Scenarios\n1905348 - QE - Design Gherkin Scenarios\n1905362 - [sriov] Error message \u0027Fail to update DaemonSet\u0027 always shown in sriov operator pod\n1905368 - [sriov] net-attach-def generated from sriovnetwork cannot be restored once it was deleted\n1905370 - A-Z/Z-A sorting dropdown on Developer Catalog page is not aligned with filter text input\n1905380 - Default to Red Hat/KubeVirt provider if common template does not have provider annotation\n1905393 - CMO uses rbac.authorization.k8s.io/v1beta1 instead of rbac.authorization.k8s.io/v1\n1905404 - The example of \"Remove the entrypoint on the mysql:latest image\" for `oc image append` does not work\n1905416 - Hyperlink not working from Operator Description\n1905430 - usbguard extension fails to install because of missing correct protobuf dependency version\n1905492 - The stalld service has a higher scheduler priority than ksoftirq and rcu{b, c} threads\n1905502 - Test flake - unable to get https transport for ephemeral-registry\n1905542 - [GSS] The \"External\" mode option is not available when the OCP cluster is deployed using Redhat Cluster Assisted Installer 4.6. \n1905599 - Errant change to lastupdatetime in copied CSV status can trigger runaway csv syncs\n1905610 - Fix typo in export script\n1905621 - Protractor login test fails against a 4.7 (nightly) Power cluster\n1905640 - Subscription manual approval test is flaky\n1905647 - Report physical core valid-for-subscription min/max/cumulative use to telemetry\n1905696 - ClusterMoreUpdatesModal component did not get internationalized\n1905748 - with sharded ingresscontrollers, all shards reload when any endpoint changes\n1905761 - NetworkPolicy with Egress policyType is resulting in SDN errors and improper communication within Project\n1905778 - inconsistent ingresscontroller between fresh installed cluster and upgraded cluster\n1905792 - [OVN]Cannot create egressfirewalll with dnsName\n1905889 - Should create SA for each namespace that the operator scoped\n1905920 - Quickstart exit and restart\n1905941 - Page goes to error after create catalogsource\n1905977 - QE ghaekin design scenaio-pipeline metrics ODC-3711\n1906032 - Canary Controller: Canary daemonset rolls out slowly in large clusters\n1906100 - Disconnected cluster upgrades are failing from the cli, when signature retrieval is being blackholed instead of quickly rejected\n1906105 - CBO annotates an existing Metal3 deployment resource to indicate that it is managing it\n1906118 - OCS feature detection constantly polls storageclusters and storageclasses\n1906120 - \u0027Create Role Binding\u0027 form not setting user or group value when created from a user or group resource\n1906121 - [oc] After new-project creation, the kubeconfig file does not set the project\n1906134 - OLM should not create OperatorConditions for copied CSVs\n1906143 - CBO supports log levels\n1906186 - i18n: Translators are not able to translate `this` without context for alert manager config\n1906228 - tuned and openshift-tuned sometimes do not terminate gracefully, slowing reboots\n1906274 - StorageClass installed by Cinder csi driver operator should enable the allowVolumeExpansion to support volume resize. \n1906276 - `oc image append` can\u0027t work with multi-arch image with  --filter-by-os=\u0027.*\u0027\n1906318 - use proper term for Authorized SSH Keys\n1906335 - The lastTransitionTime, message, reason field of operatorcondition should be optional\n1906356 - Unify Clone PVC boot source flow with URL/Container boot source\n1906397 - IPA has incorrect kernel command line arguments\n1906441 - HorizontalNav and NavBar have invalid keys\n1906448 - Deploy using virtualmedia with provisioning network disabled fails - \u0027Failed to connect to the agent\u0027 in ironic-conductor log\n1906459 - openstack: Quota Validation fails if unlimited quotas are given to a project\n1906496 - [BUG] Thanos having possible memory leak consuming huge amounts of node\u0027s memory and killing them\n1906508 - TestHeaderNameCaseAdjust outputs nil error message on some failures\n1906511 - Root reprovisioning tests flaking often in CI\n1906517 - Validation is not robust enough and may prevent to generate install-confing. \n1906518 - Update snapshot API CRDs to v1\n1906519 - Update LSO CRDs to use v1\n1906570 - Number of disruptions caused by reboots on a cluster cannot be measured\n1906588 - [ci][sig-builds] nodes is forbidden: User \"e2e-test-jenkins-pipeline-xfghs-user\" cannot list resource \"nodes\" in API group \"\" at the cluster scope\n1906650 - Cannot collect network policy, EgressFirewall, egressip logs with gather_network_logs\n1906655 - [SDN]Cannot colloect ovsdb-server.log and ovs-vswitchd.log with gather_network_logs\n1906679 - quick start panel styles are not loaded\n1906683 - Kn resources are not showing in Topology if triggers has KSVC and IMC as subscriber\n1906684 - Event Source creation fails if user selects no app group and switch to yaml and then to form\n1906685 - SinkBinding is shown in topology view if underlying resource along with actual source created\n1906689 - user can pin to nav configmaps and secrets multiple times\n1906691 - Add doc which describes disabling helm chart repository\n1906713 - Quick starts not accesible for a developer user\n1906718 - helm chart \"provided by Redhat\" is misspelled\n1906732 - Machine API proxy support should be tested\n1906745 - Update Helm endpoints to use Helm 3.4.x\n1906760 - performance issues with topology constantly re-rendering\n1906766 - localized `Autoscaled` \u0026 `Autoscaling` pod texts overlap with the pod ring\n1906768 - Virtualization nav item is incorrectly placed in the Admin Workloads section\n1906769 - topology fails to load with non-kubeadmin user\n1906770 - shortcuts on mobiles view occupies a lot of space\n1906798 - Dev catalog customization doesn\u0027t update console-config ConfigMap\n1906806 - Allow installing extra packages in ironic container images\n1906808 - [test-disabled] ServiceAccounts should support OIDC discovery of service account issuer\n1906835 - Topology view shows add page before then showing full project workloads\n1906840 - ClusterOperator should not have status \"Updating\" if operator version is the same as the release version\n1906844 - EndpointSlice and EndpointSliceProxying feature gates should be disabled for openshift-sdn kube-proxy\n1906860 - Bump kube dependencies to v1.20 for Net Edge components\n1906864 - Quick Starts Tour: Need to adjust vertical spacing\n1906866 - Translations of Sample-Utils\n1906871 - White screen when sort by name in monitoring alerts page\n1906872 - Pipeline Tech Preview Badge Alignment\n1906875 - Provide an option to force backup even when API is not available. \n1906877 - Placeholder\u0027 value in search filter do not match column heading in Vulnerabilities\n1906879 - Add missing i18n keys\n1906880 - oidcdiscoveryendpoint controller invalidates all TokenRequest API tokens during install\n1906896 - No Alerts causes odd empty Table (Need no content message)\n1906898 - Missing User RoleBindings in the Project Access Web UI\n1906899 - Quick Start - Highlight Bounding Box Issue\n1906916 - Teach CVO about flowcontrol.apiserver.k8s.io/v1beta1\n1906933 - Cluster Autoscaler should have improved mechanisms for group identifiers\n1906935 - Delete resources when Provisioning CR is deleted\n1906968 - Must-gather should support collecting kubernetes-nmstate resources\n1906986 - Ensure failed pod adds are retried even if the pod object doesn\u0027t change\n1907199 - Need to upgrade machine-api-operator module version under cluster-api-provider-kubevirt\n1907202 - configs.imageregistry.operator.openshift.io cluster does not update its status fields after URL change\n1907211 - beta promotion of p\u0026f switched storage version to v1beta1, making downgrades impossible. \n1907269 - Tooltips data are different when checking stack or not checking stack for the same time\n1907280 - Install tour of OCS not available. \n1907282 - Topology page breaks with white screen\n1907286 - The default mhc machine-api-termination-handler couldn\u0027t watch spot instance\n1907287 - [csi-snapshot-webhook] should support both v1beta1 and v1 version when creating volumesnapshot/volumesnapshotcontent\n1907293 - Increase timeouts in e2e tests\n1907295 - Gherkin script for improve management for helm\n1907299 - Advanced Subscription Badge for KMS and Arbiter not present\n1907303 - Align VM template list items by baseline\n1907304 - Use PF styles for selected template card in VM Wizard\n1907305 - Drop \u0027ISO\u0027 from CDROM boot source message\n1907307 - Support and provider labels should be passed on between templates and sources\n1907310 - Pin action should be renamed to favorite\n1907312 - VM Template source popover is missing info about added date\n1907313 - ClusterOperator objects cannot be overriden with cvo-overrides\n1907328 - iproute-tc package is missing in ovn-kube image\n1907329 - CLUSTER_PROFILE env. variable is not used by the CVO\n1907333 - Node stuck in degraded state, mcp reports \"Failed to remove rollback: error running rpm-ostree cleanup -r: error: Timeout was reached\"\n1907373 - Rebase to kube 1.20.0\n1907375 - Bump to latest available 1.20.x k8s - workloads team\n1907378 - Gather netnamespaces networking info\n1907380 - kube-rbac-proxy exposes tokens, has excessive verbosity\n1907381 - OLM fails to deploy an operator if its deployment template contains a description annotation that doesn\u0027t match the CSV one\n1907390 - prometheus-adapter: panic after k8s 1.20 bump\n1907399 - build log icon link on topology nodes cause app to reload\n1907407 - Buildah version not accessible\n1907421 - [4.6.1]oc-image-mirror command failed on \"error: unable to copy layer\"\n1907453 - Dev Perspective -\u003e running vm details -\u003e resources -\u003e no data\n1907454 - Install PodConnectivityCheck CRD with CNO\n1907459 - \"The Boot source is also maintained by Red Hat.\" is always shown for all boot sources\n1907475 - Unable to estimate the error rate of ingress across the connected fleet\n1907480 - `Active alerts` section throwing forbidden error for users. \n1907518 - Kamelets/Eventsource should be shown to user if they have create access\n1907543 - Korean timestamps are shown when users\u0027 language preferences are set to German-en-en-US\n1907610 - Update kubernetes deps to 1.20\n1907612 - Update kubernetes deps to 1.20\n1907621 - openshift/installer: bump cluster-api-provider-kubevirt version\n1907628 - Installer does not set primary subnet consistently\n1907632 - Operator Registry should update its kubernetes dependencies to 1.20\n1907639 - pass dual-stack node IPs to kubelet in dual-stack clusters\n1907644 - fix up handling of non-critical annotations on daemonsets/deployments\n1907660 - Pod list does not render cell height correctly when pod names are too long (dynamic table rerendering issue?)\n1907670 - CVE-2020-27846 crewjam/saml: authentication bypass in saml authentication\n1907671 - Ingress VIP assigned to two infra nodes simultaneously - keepalived process running in pods seems to fail\n1907767 - [e2e][automation]update test suite for kubevirt plugin\n1907770 - Recent RHCOS 47.83 builds (from rhcos-47.83.202012072210-0 on) don\u0027t allow master and worker nodes to boot\n1907792 - The `overrides` of the OperatorCondition cannot block the operator upgrade\n1907793 - Surface support info in VM template details\n1907812 - 4.7 to 4.6 downgrade stuck in clusteroperator storage\n1907822 - [OCP on OSP] openshift-install panic when checking quota with install-config have no flavor set\n1907863 - Quickstarts status not updating when starting the tour\n1907872 - dual stack with an ipv6 network fails on bootstrap phase\n1907874 - QE - Design Gherkin Scenarios for epic ODC-5057\n1907875 - No response when try to expand pvc with an invalid size\n1907876 - Refactoring record package to make gatherer configurable\n1907877 - QE - Automation- pipelines builder scripts\n1907883 - Fix Pipleine creation without namespace issue\n1907888 - Fix pipeline list page loader\n1907890 - Misleading and incomplete alert message shown in pipeline-parameters and pipeline-resources form\n1907892 - Unable to edit application deployed using \"From Devfile\" option\n1907893 - navSortUtils.spec.ts unit test failure\n1907896 - When a workload is added, Topology does not place the new items well\n1907908 - VM Wizard always uses VirtIO for the VM rootdisk regardless what is defined in common-template\n1907924 - Enable madvdontneed in OpenShift Images\n1907929 - Enable madvdontneed in OpenShift System Components Part 2\n1907936 - NTO is not reporting nto_profile_set_total metrics correctly after reboot\n1907947 - The kubeconfig saved in tenantcluster shouldn\u0027t include anything that is not related to the current context\n1907948 - OCM-O bump to k8s 1.20\n1907952 - bump to k8s 1.20\n1907972 - Update OCM link to open Insights tab\n1907989 - DataVolumes was intorduced in common templates - VM creation fails in the UI\n1907998 - Gather kube_pod_resource_request/limit metrics as exposed in upstream KEP 1916\n1908001 - [CVE-2020-10749] Update github.com/containernetworking/plugins to v.0.8.6 in egress-router-cni\n1908014 - e2e-aws-ansible and e2e-aws-helm are broken in ocp-release-operator-sdk\n1908035 - dynamic-demo-plugin build does not generate dist directory\n1908135 - quick search modal is not centered over topology\n1908145 - kube-scheduler-recovery-controller container crash loop when router pod is co-scheduled\n1908159 - [AWS C2S] MCO fails to sync cloud config\n1908171 - GCP: Installation fails when installing cluster with n1-custom-4-16384custom type (n1-custom-4-16384)\n1908180 - Add source for template is stucking in preparing pvc\n1908217 - CI: Server-Side Apply should work for oauth.openshift.io/v1: has no tokens\n1908231 - [Migration] The pods ovnkube-node are in  CrashLoopBackOff after SDN to OVN\n1908277 - QE - Automation- pipelines actions scripts\n1908280 - Documentation describing `ignore-volume-az` is incorrect\n1908296 - Fix pipeline builder form yaml switcher validation issue\n1908303 - [CVE-2020-28367 CVE-2020-28366] Remove CGO flag from rhel Dockerfile in Egress-Router-CNI\n1908323 - Create button missing for PLR in the search page\n1908342 - The new pv_collector_total_pv_count is not reported via telemetry\n1908344 - [vsphere-problem-detector] CheckNodeProviderID and CheckNodeDiskUUID have the same name\n1908347 - CVO overwrites ValidatingWebhookConfiguration for snapshots\n1908349 - Volume snapshot tests are failing after 1.20 rebase\n1908353 - QE - Automation- pipelines runs scripts\n1908361 - bump to k8s 1.20\n1908367 - QE - Automation- pipelines triggers scripts\n1908370 - QE - Automation- pipelines secrets scripts\n1908375 - QE - Automation- pipelines workspaces scripts\n1908381 - Go Dependency Fixes for Devfile Lib\n1908389 - Loadbalancer Sync failing on Azure\n1908400 - Tests-e2e, increase timeouts, re-add TestArchiveUploadedAndResultsReceived\n1908407 - Backport Upstream 95269 to fix potential crash in kubelet\n1908410 - Exclude Yarn from VSCode search\n1908425 - Create Role Binding form subject type and name are undefined when All Project is selected\n1908431 - When the marketplace-operator pod get\u0027s restarted, the custom catalogsources are gone, as well as the pods\n1908434 - Remove \u0026apos from metal3-plugin internationalized strings\n1908437 - Operator backed with no icon has no badge associated with the CSV tag\n1908459 - bump to k8s 1.20\n1908461 - Add bugzilla component to OWNERS file\n1908462 - RHCOS 4.6 ostree removed dhclient\n1908466 - CAPO AZ Screening/Validating\n1908467 - Zoom in and zoom out in topology package should be sentence case\n1908468 - [Azure][4.7] Installer can\u0027t properly parse instance type with non integer memory size\n1908469 - nbdb failed to come up while bringing up OVNKubernetes cluster\n1908471 - OLM should bump k8s dependencies to 1.20\n1908484 - oc adm release extract --cloud=aws --credentials-requests dumps all manifests\n1908493 - 4.7-e2e-metal-ipi-ovn-dualstack intermittent test failures, worker hostname is overwritten by NM\n1908545 - VM clone dialog does not open\n1908557 - [e2e][automation]Miss css id on bootsource and reviewcreate step on wizard\n1908562 - Pod readiness is not being observed in real world cases\n1908565 - [4.6] Cannot filter the platform/arch of the index image\n1908573 - Align the style of flavor\n1908583 - bootstrap does not run on additional networks if configured for master in install-config\n1908596 - Race condition on operator installation\n1908598 - Persistent Dashboard shows events for all provisioners\n1908641 - Go back to Catalog Page link on Virtual Machine page vanishes on empty state\n1908648 - Skip TestKernelType test on OKD, adjust TestExtensions\n1908650 - The title of customize wizard is inconsistent\n1908654 - cluster-api-provider: volumes and disks names shouldn\u0027t change by machine-api-operator\n1908675 - Reenable [sig-storage] CSI mock volume CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=default [Suite:openshift/conformance/parallel] [Suite:k8s]\n1908687 - Option to save user settings separate when using local bridge (affects console developers only)\n1908697 - Show `kubectl diff ` command in the oc diff help page\n1908715 - Pressing the arrow up key when on topmost quick-search list item it should loop back to bottom\n1908716 - UI breaks on click of sidebar of ksvc (if revisions not up) in topology on 4.7 builds\n1908717 - \"missing unit character in duration\" error in some network dashboards\n1908746 - [Safari] Drop Shadow doesn\u0027t works as expected on hover on workload\n1908747 - stale S3 CredentialsRequest in CCO manifest\n1908758 - AWS: NLB timeout value is rejected by AWS cloud provider after 1.20 rebase\n1908830 - RHCOS 4.6 - Missing Initiatorname\n1908868 - Update empty state message for EventSources and Channels tab\n1908880 - 4.7 aws-serial CI: NoExecuteTaintManager Single Pod [Serial] eventually evict pod with finite tolerations from tainted nodes\n1908883 - CVE-2020-29652 golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference\n1908888 - Dualstack does not work with multiple gateways\n1908889 - Bump CNO to k8s 1.20\n1908891 - TestDNSForwarding DNS operator e2e test is failing frequently\n1908914 - CNO: upgrade nodes before masters\n1908918 - Pipeline builder yaml view sidebar is not responsive\n1908960 - QE - Design Gherkin Scenarios\n1908971 - Gherkin Script for pipeline debt 4.7\n1908983 - i18n: Add Horizontal Pod Autoscaler action menu is not translated\n1908997 - Unsupported access mode should not be available when creating pvc by cinder-csi-driver/gcp-pd-csi-driver from web-console\n1908998 - [cinder-csi-driver] doesn\u0027t detect the credentials change\n1909004 - \"No datapoints found\" for RHEL node\u0027s filesystem graph\n1909005 - i18n: workloads list view heading is not translated\n1909012 - csi snapshot webhook does not block any invalid update for volumesnapshot and volumesnapshotcontent objects\n1909027 - Disks option of Sectected capacity chart shows HDD disk even on selection of SDD disk type\n1909043 - OCP + OCS 4.7 Internal - Storage cluster creation throws warning when zone=0 in VMware\n1909067 - Web terminal should keep latest output when connection closes\n1909070 - PLR and TR Logs component is not streaming as fast as tkn\n1909092 - Error Message should not confuse user on Channel form\n1909096 - OCP 4.7+OCS 4.7 - The Requested Cluster Capacity field needs to include the selected capacity in calculation in Review and Create Page\n1909108 - Machine API components should use 1.20 dependencies\n1909116 - Catalog Sort Items dropdown is not aligned on Firefox\n1909198 - Move Sink action option is not working\n1909207 - Accessibility Issue on monitoring page\n1909236 - Remove pinned icon overlap on resource name\n1909249 - Intermittent packet drop from pod to pod\n1909276 - Accessibility Issue on create project modal\n1909289 - oc debug of an init container no longer works\n1909290 - Logging may be broken due to mix of k8s.io/klog v1 and v2\n1909358 - registry.redhat.io/redhat/community-operator-index:latest only have hyperfoil-bundle\n1909453 - Boot disk RAID can corrupt ESP if UEFI firmware writes to it\n1909455 - Boot disk RAID will not boot if the primary disk enumerates but fails I/O\n1909464 - Build operator-registry with golang-1.15\n1909502 - NO_PROXY is not matched between bootstrap and global cluster setting which lead to desired master machineconfig is not found\n1909521 - Add kubevirt cluster type for e2e-test workflow\n1909527 - [IPI Baremetal] After upgrade from 4.6 to 4.7 metal3 pod does not get created\n1909587 - [OCP4] all of the OCP master nodes with soft-anti-affinity run on the same OSP node\n1909610 - Fix available capacity when no storage class selected\n1909678 - scale up / down buttons available on pod details side panel\n1909723 - cluster-api-provider-openstack: Update ose-openstack-machine-controllers builder \u0026 base images to be consistent with ART\n1909730 - unbound variable error if EXTRA_PKGS_LIST is not defined\n1909739 - Arbiter request data changes\n1909744 - cluster-api-provider-openstack: Bump gophercloud\n1909790 - PipelineBuilder yaml view cannot be used for editing a pipeline\n1909791 - Update standalone kube-proxy config for EndpointSlice\n1909792 - Empty states for some details page subcomponents are not i18ned\n1909815 - Perspective switcher is only half-i18ned\n1909821 - OCS 4.7 LSO installation blocked because of Error \"Invalid value: \"integer\": spec.flexibleScaling in body\n1909836 - operator-install-global Cypress test was failing in OLM as it depends on an operator that isn\u0027t installed in CI\n1909864 - promote-release-openshift-machine-os-content-e2e-aws-4.5 is perm failing\n1909911 - [OVN]EgressFirewall caused a segfault\n1909943 - Upgrade from 4.6 to 4.7 stuck due to write /sys/devices/xxxx/block/sda/queue/scheduler: invalid argument\n1909958 - Support Quick Start Highlights Properly\n1909978 - ignore-volume-az = yes not working on standard storageClass\n1909981 - Improve statement in template select step\n1909992 - Fail to pull the bundle image when using the private index image\n1910024 - Reload issue in latest(4.7) UI code on 4.6 cluster locally in dev\n1910036 - QE - Design Gherkin Scenarios ODC-4504\n1910049 - UPI: ansible-galaxy is not supported\n1910127 - [UPI on oVirt]:  Improve UPI Documentation\n1910140 - fix the api dashboard with changes in upstream kube 1.20\n1910160 - If two OperatorConditions include the same deployments they will keep updating the deployment\u0027s containers with the OPERATOR_CONDITION_NAME Environment Variable\n1910165 - DHCP to static lease script doesn\u0027t handle multiple addresses\n1910305 - [Descheduler] - The minKubeVersion should be 1.20.0\n1910409 - Notification drawer is not localized for i18n\n1910459 - Could not provision gcp volume if delete secret gcp-pd-cloud-credentials\n1910492 - KMS details are auto-populated on the screen in next attempt at Storage cluster creation\n1910501 - Installed Operators-\u003eOperand required: Clicking on cancel in Storage cluster page takes back to the Install Operator page\n1910533 - [OVN] It takes about 5 minutes for EgressIP failover to work\n1910581 - library-go: proxy ENV is not injected into csi-driver-controller which lead to storage operator never get ready\n1910666 - Creating a Source Secret from type SSH-Key should use monospace font for better usability\n1910738 - OCP 4.7 Installation fails on VMWare due to 1 worker that is degraded\n1910739 - Redfish-virtualmedia (idrac) deploy fails on \"The Virtual Media image server is already connected\"\n1910753 - Support Directory Path to Devfile\n1910805 - Missing translation for Pipeline status and breadcrumb text\n1910829 - Cannot delete a PVC if the dv\u0027s phase is WaitForFirstConsumer\n1910840 - Show Nonexistent  command info in the `oc rollback -h` help page\n1910859 - breadcrumbs doesn\u0027t use last namespace\n1910866 - Unify templates string\n1910870 - Unify template dropdown action\n1911016 - Prometheus unable to mount NFS volumes after upgrading to 4.6\n1911129 - Monitoring charts renders nothing when switching from a Deployment to \"All workloads\"\n1911176 - [MSTR-998] Wrong text shown when hovering on lines of charts in API Performance dashboard\n1911212 - [MSTR-998] API Performance Dashboard \"Period\" drop-down has a choice \"$__auto_interval_period\" which can bring \"1:154: parse error: missing unit character in duration\"\n1911213 - Wrong and misleading warning for VMs that were created manually (not from template)\n1911257 - [aws-c2s] failed to create cluster, kube-cloud-config was not created\n1911269 - waiting for the build message present when build exists\n1911280 - Builder images are not detected for Dotnet, Httpd, NGINX\n1911307 - Pod Scale-up requires extra privileges in OpenShift web-console\n1911381 - \"Select Persistent Volume Claim project\" shows in customize wizard when select a source available template\n1911382 - \"source volumeMode (Block) and target volumeMode (Filesystem) do not match\" shows in VM Error\n1911387 - Hit error - \"Cannot read property \u0027value\u0027 of undefined\" while creating VM from template\n1911408 - [e2e][automation] Add auto-clone cli tests and new flow of VM creation\n1911418 - [v2v] The target storage class name is not displayed if default storage class is used\n1911434 - git ops empty state page displays icon with watermark\n1911443 - SSH Cretifiaction field should be validated\n1911465 - IOPS display wrong unit\n1911474 - Devfile Application Group Does Not Delete Cleanly (errors)\n1911487 - Pruning Deployments should use ReplicaSets instead of ReplicationController\n1911574 - Expose volume mode  on Upload Data form\n1911617 - [CNV][UI] Failure to add source to VM template when no default storage class is defined\n1911632 - rpm-ostree command fail due to wrong options when updating ocp-4.6 to 4.7 on worker nodes with rt-kernel\n1911656 - using \u0027operator-sdk run bundle\u0027 to install operator successfully, but the command output said \u0027Failed to run bundle\u0027\u0027\n1911664 - [Negative Test] After deleting metal3 pod, scaling worker stuck on provisioning state\n1911782 - Descheduler should not evict pod used local storage by the PVC\n1911796 - uploading flow being displayed before submitting the form\n1912066 - The ansible type operator\u0027s manager container is not stable when managing the CR\n1912077 - helm operator\u0027s default rbac forbidden\n1912115 - [automation] Analyze job keep failing because of \u0027JavaScript heap out of memory\u0027\n1912237 - Rebase CSI sidecars for 4.7\n1912381 - [e2e][automation] Miss css ID on Create Network Attachment Definition page\n1912409 - Fix flow schema deployment\n1912434 - Update guided tour modal title\n1912522 - DNS Operator e2e test: TestCoreDNSImageUpgrade is fundamentally broken\n1912523 - Standalone pod status not updating in topology graph\n1912536 - Console Plugin CR for console-demo-plugin has wrong apiVersion\n1912558 - TaskRun list and detail screen doesn\u0027t show Pending status\n1912563 - p\u0026f: carry 97206: clean up executing request on panic\n1912565 - OLM macOS local build broken by moby/term dependency\n1912567 - [OCP on RHV] Node becomes to \u0027NotReady\u0027 status when shutdown vm from RHV UI only on the second deletion\n1912577 - 4.1/4.2-\u003e4.3-\u003e...-\u003e 4.7 upgrade is stuck during 4.6-\u003e4.7 with co/openshift-apiserver Degraded, co/network not Available and several other components pods CrashLoopBackOff\n1912590 - publicImageRepository not being populated\n1912640 - Go operator\u0027s controller pods is forbidden\n1912701 - Handle dual-stack configuration for NIC IP\n1912703 - multiple queries can\u0027t be plotted in the same graph under some conditons\n1912730 - Operator backed: In-context should support visual connector if SBO is not installed\n1912828 - Align High Performance VMs with High Performance in RHV-UI\n1912849 - VM from wizard - default flavor does not match the actual flavor set by common templates\n1912852 - VM from wizard - available VM templates - \"storage\" field is \"0 B\"\n1912888 - recycler template should be moved to KCM operator\n1912907 - Helm chart repository index can contain unresolvable relative URL\u0027s\n1912916 - Set external traffic policy to cluster for IBM platform\n1912922 - Explicitly specifying the operator generated default certificate for an ingress controller breaks the ingress controller\n1912938 - Update confirmation modal for quick starts\n1912942 - cluster-storage-operator: proxy ENV is not injected into vsphere-problem-detector deployment\n1912944 - cluster-storage-operator: proxy ENV is not injected into Manila CSI driver operator deployment\n1912945 - aws-ebs-csi-driver-operator: proxy ENV is not injected into the CSI driver\n1912946 - gcp-pd-csi-driver-operator: proxy ENV is not injected into the CSI driver\n1912947 - openstack-cinder-csi-driver-operator: proxy ENV is not injected into the CSI driver\n1912948 - csi-driver-manila-operator: proxy ENV is not injected into the CSI driver\n1912949 - ovirt-csi-driver-operator: proxy ENV is not injected into the CSI driver\n1912977 - rebase upstream static-provisioner\n1913006 - Remove etcd v2 specific alerts with etcd_http* metrics\n1913011 - [OVN] Pod\u0027s external traffic not use egressrouter macvlan ip as a source ip\n1913037 - update static-provisioner base image\n1913047 - baremetal clusteroperator progressing status toggles between true and false when cluster is in a steady state\n1913085 - Regression OLM uses scoped client for CRD installation\n1913096 - backport: cadvisor machine metrics are missing in k8s 1.19\n1913132 - The installation of Openshift Virtualization reports success early before it \u0027s succeeded eventually\n1913154 - Upgrading to 4.6.10 nightly failed with RHEL worker nodes: Failed to find /dev/disk/by-label/root\n1913196 - Guided Tour doesn\u0027t handle resizing of browser\n1913209 - Support modal should be shown for community supported templates\n1913226 - [Migration] The SDN migration rollback failed if customize vxlanPort\n1913249 - update info alert this template is not aditable\n1913285 - VM list empty state should link to virtualization quick starts\n1913289 - Rebase AWS EBS CSI driver for 4.7\n1913292 - OCS 4.7 Installation failed over vmware when arbiter was enabled, as flexibleScaling is also getting enabled\n1913297 - Remove restriction of taints for arbiter node\n1913306 - unnecessary scroll bar is present on quick starts panel\n1913325 - 1.20 rebase for openshift-apiserver\n1913331 - Import from git: Fails to detect Java builder\n1913332 - Pipeline visualization breaks the UI when multiple taskspecs are used\n1913343 - (release-4.7) Added changelog file for insights-operator\n1913356 - (release-4.7) Implemented gathering specific logs from openshift apiserver operator\n1913371 - Missing i18n key \"Administrator\" in namespace \"console-app\" and language \"en.\"\n1913386 - users can see metrics of namespaces for which they don\u0027t have rights when monitoring own services with prometheus user workloads\n1913420 - Time duration setting of resources is not being displayed\n1913536 - 4.6.9 -\u003e 4.7 upgrade hangs.  RHEL 7.9 worker stuck on \"error enabling unit: Failed to execute operation: File exists\\\\n\\\"\n1913554 - Recording rule for ingress error fraction SLI is incorrect, uses irate instead of increase\n1913560 - Normal user cannot load template on the new wizard\n1913563 - \"Virtual Machine\" is not on the same line in create button when logged with normal user\n1913567 - Tooltip data should be same for line chart or stacked chart, display data value same as the table\n1913568 - Normal user cannot create template\n1913582 - [Migration]SDN to OVN migration stucks on MCO for rhel worker\n1913585 - Topology descriptive text fixes\n1913608 - Table data contains data value None after change time range in graph and change back\n1913651 - Improved Red Hat image and crashlooping OpenShift pod collection\n1913660 - Change location and text of Pipeline edit flow alert\n1913685 - OS field not disabled when creating a VM from a template\n1913716 - Include additional use of existing libraries\n1913725 - Refactor Insights Operator Plugin states\n1913736 - Regression: fails to deploy computes when using root volumes\n1913747 - Update operator to kubernetes 1.20.1 to pickup upstream fixes\n1913751 - add third-party network plugin test suite to openshift-tests\n1913783 - QE-To fix the merging pr issue, commenting the afterEach() block\n1913807 - Template support badge should not be shown for community supported templates\n1913821 - Need definitive steps about uninstalling descheduler operator\n1913851 - Cluster Tasks are not sorted in pipeline builder\n1913864 - BuildConfig YAML template references ruby ImageStreamTag that no longer exists\n1913951 - Update the Devfile Sample Repo to an Official Repo Host\n1913960 - Cluster Autoscaler should use 1.20 dependencies\n1913969 - Field dependency descriptor can sometimes cause an exception\n1914060 - Disk created from \u0027Import via Registry\u0027 cannot be used as boot disk\n1914066 - [sriov] sriov dp pod crash when delete ovs HW offload policy\n1914090 - Grafana - The resulting dataset is too large to graph (OCS RBD volumes being counted as disks)\n1914119 - vsphere problem detector operator has no permission to update storages.operator.openshift.io instances\n1914125 - Still using /dev/vde as default device path when create localvolume\n1914183 - Empty NAD page is missing link to quickstarts\n1914196 - target port in `from dockerfile` flow does nothing\n1914204 - Creating VM from dev perspective may fail with template not found error\n1914209 - Associate image secret name to pipeline serviceaccount imagePullSecrets\n1914212 - [e2e][automation] Add test to validate bootable disk souce\n1914250 - ovnkube-node fails on master nodes when both DHCPv6 and SLAAC addresses are configured on nodes\n1914284 - Upgrade to OCP 4.6.9 results in cluster-wide DNS and connectivity issues due to bad NetworkPolicy flows\n1914287 - Bring back selfLink\n1914301 - User VM Template source should show the same provider as template itself\n1914303 - linuxptp-daemon is not forwarding ptp4l stderr output to openshift logs\n1914309 - /terminal page when WTO not installed shows nonsensical error\n1914334 - order of getting started samples is arbitrary\n1914343 - [sig-imageregistry][Feature:ImageTriggers] Annotation trigger reconciles after the image is overwritten [Suite:openshift/conformance/parallel]  timeout on s390x\n1914349 - Increase and decrease buttons in max and min pods in HPA page has distorted UI\n1914405 - Quick search modal should be opened when coming back from a selection\n1914407 - Its not clear that node-ca is running as non-root\n1914427 - Count of pods on the dashboard is incorrect\n1914439 - Typo in SRIOV port create command example\n1914451 - cluster-storage-operator pod running as root\n1914452 - oc image append, oc image extract outputs wrong suggestion to use --keep-manifest-list=true\n1914642 - Customize Wizard Storage tab does not pass validation\n1914723 - SamplesTBRInaccessibleOnBoot Alert has a misspelling\n1914793 - device names should not be translated\n1914894 - Warn about using non-groupified api version\n1914926 - webdriver-manager pulls incorrect version of ChomeDriver due to a bug\n1914932 - Put correct resource name in relatedObjects\n1914938 - PVC disk is not shown on customization wizard general tab\n1914941 - VM Template rootdisk is not deleted after fetching default disk bus\n1914975 - Collect logs from openshift-sdn namespace\n1915003 - No estimate of average node readiness during lifetime of a cluster\n1915027 - fix MCS blocking iptables rules\n1915041 - s3:ListMultipartUploadParts is relied on implicitly\n1915079 - Canary controller should not periodically rotate the canary route endpoint for performance reasons\n1915080 - Large number of tcp connections with shiftstack ocp cluster in about 24 hours\n1915085 - Pods created and rapidly terminated get stuck\n1915114 - [aws-c2s] worker machines are not create during install\n1915133 - Missing default pinned nav items in dev perspective\n1915176 - Update snapshot API CRDs to v1 in web-console when creating volumesnapshot related resource\n1915187 - Remove the \"Tech preview\" tag in web-console for volumesnapshot\n1915188 - Remove HostSubnet anonymization\n1915200 - [OCP 4.7+ OCS 4.6]Arbiter related Note should not show up during UI deployment\n1915217 - OKD payloads expect to be signed with production keys\n1915220 - Remove dropdown workaround for user settings\n1915235 - Failed to upgrade to 4.7 from 4.6 due to the machine-config failure\n1915262 - When deploying with assisted install the CBO operator is installed and enabled without metal3 pod\n1915277 - [e2e][automation]fix cdi upload form test\n1915295 - [BM][IP][Dualstack] Installation failed - operators report dial tcp 172.30.0.1:443: i/o timeout\n1915304 - Updating scheduling component builder \u0026 base images to be consistent with ART\n1915312 - Prevent schedule Linux openshift-network-diagnostics pod on Windows node\n1915318 - [Metal] bareMetal IPI - cannot interact with toolbox container after first execution only in parallel from different connection\n1915348 - [RFE] linuxptp operator needs to expose the uds_address_socket to be used by an application pod\n1915357 - Dev Catalog doesn\u0027t load anything if virtualization operator is installed\n1915379 - New template wizard should require provider and make support input a dropdown type\n1915408 - Failure in operator-registry kind e2e test\n1915416 - [Descheduler] descheduler evicts pod which does not have any ownerRef or descheduler evict annotation\n1915460 - Cluster name size might affect installations\n1915500 - [aws c2s] kube-controller-manager crash loops trying to fetch the AWS instance\n1915540 - Silent 4.7 RHCOS install failure on ppc64le\n1915579 - [Metal] redhat-support-tool became unavailable after tcpdump usage (BareMetal IPI)\n1915582 - p\u0026f: carry upstream pr 97860\n1915594 - [e2e][automation] Improve test for disk validation\n1915617 - Bump bootimage for various fixes\n1915624 - \"Please fill in the following field: Template provider\" blocks customize wizard\n1915627 - Translate Guided Tour text. \n1915643 - OCP4.6 to 4.7 upgrade failed due to manila csi driver operator sync error\n1915647 - Intermittent White screen when the connector dragged to revision\n1915649 - \"Template support\" pop up is not a warning; checkbox text should be rephrased\n1915654 - [e2e][automation] Add a verification for Afinity modal should hint \"Matching node found\"\n1915661 - Can\u0027t run the \u0027oc adm prune\u0027 command in a pod\n1915672 - Kuryr doesn\u0027t work with selfLink disabled. \n1915674 - Golden image PVC creation - storage size should be taken from the template\n1915685 - Message for not supported template is not clear enough\n1915760 - Need to increase timeout to wait rhel worker get ready\n1915793 - quick starts panel syncs incorrectly across browser windows\n1915798 - oauth connection errors for openshift console pods on an OVNKube OCP 4.7 cluster\n1915818 - vsphere-problem-detector: use \"_totals\" in metrics\n1915828 - Latest Dell firmware (04.40.00.00) fails to install IPI on BM using idrac-virtualmedia protocol\n1915859 - vsphere-problem-detector: does not report ESXi host version nor VM HW version\n1915871 - operator-sdk version in new downstream image should be v1.2.0-ocp not v4.7.0\n1915879 - Pipeline Dashboard tab Rename to Pipeline Metrics\n1915885 - Kuryr doesn\u0027t support workers running on multiple subnets\n1915898 - TaskRun log output shows \"undefined\" in streaming\n1915907 - test/cmd/builds.sh uses docker.io\n1915912 - sig-storage-csi-snapshotter image not available\n1915926 - cluster-api-provider-openstack: Update ose-openstack-machine-controllers builder \u0026 base images to be consistent with ART\n1915929 - A11y Violation: svg-img-alt for time axis of Utilization Card on Cluster Dashboard\n1915939 - Resizing the browser window removes Web Terminal Icon\n1915945 - [sig-scheduling] SchedulerPreemption [Serial] validates basic preemption works [Conformance]\n1915959 - Baremetal cluster operator is included in a ROKS installation of 4.7\n1915962 - ROKS: manifest with machine health check fails to apply in 4.7\n1915972 - Global configuration breadcrumbs do not work as expected\n1915981 - Install ethtool and conntrack in container for debugging\n1915995 - \"Edit RoleBinding Subject\" action under RoleBinding list page kebab actions causes unhandled exception\n1915998 - Installer bootstrap node setting of additional subnets inconsistent with additional security groups\n1916021 - OLM enters infinite loop if Pending CSV replaces itself\n1916056 - Need Visual Web Terminal metric enabled for OCP monitoring telemetry\n1916081 - non-existant should be non-existent in CloudCredentialOperatorTargetNamespaceMissing alert\u0027s annotations\n1916099 - VM creation - customization wizard - user should be allowed to delete and re-create root disk\n1916126 - [e2e][automation] Help fix tests for vm guest-agent and next-run-configuration\n1916145 - Explicitly set minimum versions of python libraries\n1916164 - Update csi-driver-nfs builder \u0026 base images to be consistent with ART\n1916221 - csi-snapshot-controller-operator: bump dependencies for 4.7\n1916271 - Known issues should mention failure to apply soft-anti-affinity to masters beyond the third\n1916363 - [OVN] ovs-configuration.service reports as failed within all nodes using version 4.7.0-fc.2\n1916379 - error metrics from vsphere-problem-detector should be gauge\n1916382 - Can\u0027t create ext4 filesystems with Ignition\n1916384 - 4.5.15 and later cluster-version operator does not sync ClusterVersion status before exiting, leaving \u0027verified: false\u0027 even for verified updates\n1916401 - Deleting an ingress controller with a bad DNS Record hangs\n1916417 - [Kuryr] Must-gather does not have all Custom Resources information\n1916419 - [sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image\n1916454 - teach CCO about upgradeability from 4.6 to 4.7\n1916486 - [OCP RHV] [Docs] Update RHV CSI provisioning section in OCP documenation\n1916502 - Boot disk mirroring fails with mdadm error\n1916524 - Two rootdisk shows on storage step\n1916580 - Default yaml is broken for VM and VM template\n1916621 - oc adm node-logs examples are wrong\n1916642 - [zh_CN] Redundant period in Secrets - Create drop down menu - Key value secret. \n1916692 - Possibly fails to destroy LB and thus cluster\n1916711 - Update Kube dependencies in MCO to 1.20.0\n1916747 - remove links to quick starts if virtualization operator isn\u0027t updated to 2.6\n1916764 - editing a workload with no application applied, will auto fill the app\n1916834 - Pipeline Metrics - Text Updates\n1916843 - collect logs from openshift-sdn-controller pod\n1916853 - cluster will not gracefully recover if openshift-etcd namespace is removed\n1916882 - OCS 4.7 LSO : wizard (Discover disks and create storageclass) does not show zone when topology.kubernetes.io/zone are added manually\n1916888 - OCS wizard Donor chart does not get updated when `Device Type` is edited\n1916938 - Using 4.6 install-config.yaml file with lbFloatingIP results in validation error \"Forbidden: cannot specify lbFloatingIP and apiFloatingIP together\"\n1916949 - ROKS: manifests in openshift-oauth-apiserver ns fails to create with non-existent namespace\n1917101 - [UPI on oVirt] - \u0027RHCOS image\u0027 topic isn\u0027t located in the right place in UPI document\n1917114 - Upgrade from 4.5.9 to 4.7 fails as authentication operator is Degraded due to \u0027\"ProxyConfigController\" controller failed to sync \"key\"\u0027 error\n1917117 - Common templates - disks screen: invalid disk name\n1917124 - Custom template - clone existing PVC - the name of the target VM\u0027s data volume is hard-coded; only one VM can be created\n1917146 - [oVirt] Consume 23-10 ovirt sdk- csi operator\n1917147 - [oVirt] csi operator panics if ovirt-engine suddenly becomes unavailable. \n1917148 - [oVirt] Consume 23-10 ovirt sdk\n1917239 - Monitoring time options overlaps monitoring tab navigation when Quickstart panel is opened\n1917272 - Should update the default minSize to 1Gi when create localvolumeset on web console\n1917303 - [automation][e2e] make kubevirt-plugin gating job mandatory\n1917315 - localvolumeset-local-provisoner-xxx pods are not killed after upgrading from 4.6 to 4.7\n1917327 - annotations.message maybe wrong for NTOPodsNotReady alert\n1917367 - Refactor periodic.go\n1917371 - Add docs on how to use the built-in profiler\n1917372 - Application metrics are shown on Metrics dashboard but not in linked Prometheus UI in OCP management console\n1917395 - pv-pool backing store name restriction should be at 43 characters from the ocs ui\n1917484 - [BM][IPI] Failed to scale down machineset\n1917522 - Deprecate --filter-by-os in oc adm catalog mirror\n1917537 - controllers continuously busy reconciling operator\n1917551 - use min_over_time for vsphere prometheus alerts\n1917585 - OLM Operator install page missing i18n\n1917587 - Manila CSI operator becomes degraded if user doesn\u0027t have permissions to list share types\n1917605 - Deleting an exgw causes pods to no longer route to other exgws\n1917614 - [aws c2s] ingress operator uses unavailable resourcegrouptaggings API\n1917656 - Add to Project/application for eventSources from topology shows 404\n1917658 - Show TP badge for sources powered by camel connectors in create flow\n1917660 - Editing parallelism of job get error info\n1917678 - Could not provision pv when no symlink and target found on rhel worker\n1917679 - Hide double CTA in admin pipelineruns tab\n1917683 - `NodeTextFileCollectorScrapeError` alert in OCP 4.6 cluster. \n1917759 - Console operator panics after setting plugin that does not exists to the console-operator config\n1917765 - ansible-operator version in downstream image should be v1.3.0 not v4.7.0\n1917770 - helm-operator version in downstream image should be v1.3.0 not v4.7.0\n1917799 - Gather s list of names and versions of installed OLM operators\n1917803 - [sig-storage] Pod Disks should be able to delete a non-existent PD without error\n1917814 - Show Broker create option in eventing under admin perspective\n1917838 - MachineSet scaling from 0 is not available or evaluated incorrectly for the new or changed instance types\n1917872 - [oVirt] rebase on latest SDK 2021-01-12\n1917911 - network-tools needs ovnkube-trace binary from ovn-kubernetes image\n1917938 - upgrade version of dnsmasq package\n1917942 - Canary controller causes panic in ingress-operator\n1918019 - Undesired scrollbars in markdown area of QuickStart\n1918068 - Flaky olm integration tests\n1918085 - reversed name of job and namespace in cvo log\n1918112 - Flavor is not editable if a customize VM is created from cli\n1918129 - Update IO sample archive with missing resources \u0026 remove IP anonymization from clusteroperator resources\n1918132 - i18n: Volume Snapshot Contents menu is not translated\n1918133 - [e2e][automation] Fix ocp 4.7 existing tests - part2\n1918140 - Deployment openstack-cinder-csi-driver-controller and openstack-manila-csi-controllerplugin doesn\u0027t be installed on OSP\n1918153 - When `\u0026` character is set as an environment variable in a build config it is getting converted as `\\u0026`\n1918185 - Capitalization on PLR details page\n1918287 - [ovirt] ovirt csi driver is flooding RHV with API calls and spam the event UI with new connections\n1918318 - Kamelet connector\u0027s are not shown in eventing section under Admin perspective\n1918351 - Gather SAP configuration (SCC \u0026 ClusterRoleBinding)\n1918375 - [calico] rbac-proxy container in kube-proxy fails to create tokenreviews\n1918395 - [ovirt] increase livenessProbe period\n1918415 - MCD nil pointer on dropins\n1918438 - [ja_JP, zh_CN] Serverless i18n misses\n1918440 - Kernel Arguments get reapplied even when no new kargs has been added in MachineConfig\n1918471 - CustomNoUpgrade Feature gates are not working correctly\n1918558 - Supermicro nodes boot to PXE upon reboot after successful deployment to disk\n1918622 - Updating ose-jenkins-agent-maven builder \u0026 base images to be consistent with ART\n1918623 - Updating ose-jenkins-agent-nodejs-12 builder \u0026 base images to be consistent with ART\n1918625 - Updating ose-jenkins-agent-nodejs-10 builder \u0026 base images to be consistent with ART\n1918635 - Updating openshift-jenkins-2 builder \u0026 base images to be consistent with ART #1197\n1918639 - Event listener with triggerRef crashes the console\n1918648 - Subscription page doesn\u0027t show InstallPlan correctly\n1918716 - Manilacsi becomes degraded even though it is not available with the underlying Openstack\n1918748 - helmchartrepo is not http(s)_proxy-aware\n1918757 - Consistant fallures of features/project-creation.feature Cypress test in CI\n1918803 - Need dedicated details page w/ global config breadcrumbs for \u0027KnativeServing\u0027 plugin\n1918826 - Insights popover icons are not horizontally aligned\n1918879 - need better debug for bad pull secrets\n1918958 - The default NMstate instance from the operator is incorrect\n1919097 - Close bracket \")\" missing at the end of the sentence in the UI\n1919231 - quick search modal cut off on smaller screens\n1919259 - Make \"Add x\" singular in Pipeline Builder\n1919260 - VM Template list actions should not wrap\n1919271 - NM prepender script doesn\u0027t support systemd-resolved\n1919341 - Updating ose-jenkins-agent-maven builder \u0026 base images to be consistent with ART\n1919360 - Need managed-cluster-info metric enabled for OCP monitoring telemetry\n1919379 - dotnet logo out of date\n1919387 - Console login fails with no error when it can\u0027t write to localStorage\n1919396 - A11y Violation: svg-img-alt on Pod Status ring\n1919407 - OpenStack IPI has three-node control plane limitation, but InstallConfigs aren\u0027t verified\n1919750 - Search InstallPlans got Minified React error\n1919778 - Upgrade is stuck in insights operator Degraded with \"Source clusterconfig could not be retrieved\" until insights operator pod is manually deleted\n1919823 - OCP 4.7 Internationalization Chinese tranlate issue\n1919851 - Visualization does not render when Pipeline \u0026 Task share same name\n1919862 - The tip information for `oc new-project  --skip-config-write` is wrong\n1919876 - VM created via customize wizard cannot inherit template\u0027s PVC attributes\n1919877 - Click on KSVC breaks with white screen\n1919879 - The toolbox container name is changed from \u0027toolbox-root\u0027  to \u0027toolbox-\u0027 in a chroot environment\n1919945 - user entered name value overridden by default value when selecting a git repository\n1919968 - [release-4.7] Undiagnosed panic detected in pod runtime.go:76: invalid memory address or nil pointer dereference\n1919970 - NTO does not update when the tuned profile is updated. \n1919999 - Bump Cluster Resource Operator Golang Versions\n1920027 - machine-config-operator consistently failing during 4.6 to 4.7 upgrades and clusters do not install successfully with proxy configuration\n1920200 - user-settings network error results in infinite loop of requests\n1920205 - operator-registry e2e tests not working properly\n1920214 - Bump golang to 1.15 in cluster-resource-override-admission\n1920248 - re-running the pipelinerun with pipelinespec crashes the UI\n1920320 - VM template field is \"Not available\" if it\u0027s created from common template\n1920367 - When creating localvolumeset instance from the web console, the title for setting volumeMode is `Disk Mode`\n1920368 - Fix containers creation issue resulting in runc running on Guaranteed Pod CPUs\n1920390 - Monitoring \u003e Metrics graph shifts to the left when clicking the \"Stacked\" option and when toggling data series lines on / off\n1920426 - Egress Router CNI OWNERS file should have ovn-k team members\n1920427 - Need to update `oc login` help page since we don\u0027t support prompt interactively for the username\n1920430 - [V2V] [UI] Browser window becomes empty when running import wizard for the first time\n1920438 - openshift-tuned panics on turning debugging on/off. \n1920445 - e2e-gcp-ovn-upgrade job is actually using openshift-sdn\n1920481 - kuryr-cni pods using unreasonable amount of CPU\n1920509 - wait for port 6443 to be open in the kube-scheduler container; use ss instead of lsof\n1920524 - Topology graph crashes adding Open Data Hub operator\n1920526 - catalog operator causing CPU spikes and bad etcd performance\n1920551 - Boot Order is not editable for Templates in \"openshift\" namespace\n1920555 - bump cluster-resource-override-admission api dependencies\n1920571 - fcp multipath will not recover failed paths automatically\n1920619 - Remove default scheduler profile value\n1920655 - Console should not show the Create Autoscaler link in cluster settings when the CRD is not present\n1920674 - MissingKey errors in bindings namespace\n1920684 - Text in language preferences modal is misleading\n1920695 - CI is broken because of bad image registry reference in the Makefile\n1920756 - update generic-admission-server library to get the system:masters authorization optimization\n1920769 - [Upgrade] OCP upgrade from 4.6.13 to 4.7.0-fc.4 for \"network-check-target\" failed when \"defaultNodeSelector\" is set\n1920771 - i18n: Delete persistent volume claim drop down is not translated\n1920806 - [OVN]Nodes lost network connection after reboot on the vSphere UPI\n1920912 - Unable to power off BMH from console\n1920981 - When OCS was deployed with arbiter mode enable add capacity is increasing the count by \"2\"\n1920984 - [e2e][automation] some menu items names are out dated\n1921013 - Gather PersistentVolume definition (if any) used in image registry config\n1921023 - Do not enable Flexible Scaling to true for Internal mode clusters(revert to 4.6 behavior)\n1921087 - \u0027start next quick start\u0027 link doesn\u0027t work and is unintuitive\n1921088 - test-cmd is failing on volumes.sh pretty consistently\n1921248 - Clarify the kubelet configuration cr description\n1921253 - Text filter default placeholder text not internationalized\n1921258 - User Preferences: Active perspective and project change in the current window when selected in a different window\n1921275 - Panic in authentication-operator in (*deploymentController).updateOperatorDeploymentInfo\n1921277 - Fix Warning and Info log statements to handle arguments\n1921281 - oc get -o yaml --export returns \"error: unknown flag: --export\"\n1921458 - [SDK] Gracefully handle the `run bundle-upgrade` if the lower version operator doesn\u0027t exist\n1921556 - [OCS with Vault]: OCS pods didn\u0027t comeup after deploying with Vault details from UI\n1921572 - For external source (i.e GitHub Source) form view as well shows yaml\n1921580 - [e2e][automation]Test VM detail view actions dropdown does not pass\n1921610 - Pipeline metrics font size inconsistency\n1921644 - [e2e][automation] tests errors with wrong cloudInit new line syntax\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n1921655 - [OSP] Incorrect error handling during cloudinfo generation\n1921713 - [e2e][automation]  fix failing VM migration tests\n1921762 - Serving and Eventing breadcrumbs should direct users back to tabbed page view\n1921774 - delete application modal errors when a resource cannot be found\n1921806 - Explore page APIResourceLinks aren\u0027t i18ned\n1921823 - CheckBoxControls not internationalized\n1921836 - AccessTableRows don\u0027t internationalize \"User\" or \"Group\"\n1921857 - Test flake when hitting router in e2e tests due to one router not being up to date\n1921880 - Dynamic plugins are not initialized on console load in production mode\n1921911 - Installer PR #4589 is causing leak of IAM role policy bindings\n1921921 - \"Global Configuration\" breadcrumb does not use sentence case\n1921949 - Console bug - source code URL broken for gitlab self-hosted repositories\n1921954 - Subscription-related constraints in ResolutionFailed events are misleading\n1922015 - buttons in modal header are invisible on Safari\n1922021 - Nodes terminal page \u0027Expand\u0027 \u0027Collapse\u0027 button not translated\n1922050 - [e2e][automation] Improve vm clone tests\n1922066 - Cannot create VM from custom template which has extra disk\n1922098 - Namespace selection dialog is not closed after select a namespace\n1922099 - Updated Readme documentation for QE code review and setup\n1922146 - Egress Router CNI doesn\u0027t have logging support. \n1922267 - Collect specific ADFS error\n1922292 - Bump RHCOS boot images for 4.7\n1922454 - CRI-O doesn\u0027t enable pprof by default\n1922473 - reconcile LSO images for 4.8\n1922573 - oc returns an error while using -o jsonpath when there is no resource found in the namespace\n1922782 - Source registry missing docker:// in yaml\n1922907 - Interop UI Tests - step implementation for updating feature files\n1922911 - Page crash when click the \"Stacked\" checkbox after clicking the data series toggle buttons\n1922991 - \"verify /run filesystem contents do not have unexpected content using a simple Docker Strategy Build\" test fails on OKD\n1923003 - WebConsole Insights widget showing \"Issues pending\" when the cluster doesn\u0027t report anything\n1923098 - [vsphere-problem-detector-operator] Need permission to access replicasets.apps resources\n1923102 - [vsphere-problem-detector-operator] pod\u0027s version is not correct\n1923245 - [Assisted-4.7] [Staging][Minimal-ISO] nodes fails to boot\n1923674 - k8s 1.20 vendor dependencies\n1923721 - PipelineRun running status icon is not rotating\n1923753 - Increase initialDelaySeconds for ovs-daemons container in the ovs-node daemonset for upgrade scenarios\n1923774 - Docker builds failing for openshift/cluster-resource-override-admission-operator\n1923802 - ci/prow/e2e-aws-olm build failing for openshift/cluster-resource-override-admission-operator\n1923874 - Unable to specify values with % in kubeletconfig\n1923888 - Fixes error metadata gathering\n1923892 - Update arch.md after refactor. \n1923894 - \"installed\" operator status in operatorhub page does not reflect the real status of operator\n1923895 - Changelog generation. \n1923911 - [e2e][automation] Improve tests for vm details page and list filter\n1923945 - PVC Name and Namespace resets when user changes os/flavor/workload\n1923951 - EventSources shows `undefined` in project\n1923973 - Dynamic plugin demo README does not contain info how to enable the ConsolePlugins\n1924046 - Localhost: Refreshing on a Project removes it from nav item urls\n1924078 - Topology quick search View all results footer should be sticky. \n1924081 - NTO should ship the latest Tuned daemon release 2.15\n1924084 - backend tests incorrectly hard-code artifacts dir\n1924128 - [sig-builds][Feature:Builds] verify /run filesystem contents  do not have unexpected content using a simple Docker Strategy Build\n1924135 - Under sufficient load, CRI-O may segfault\n1924143 - Code Editor Decorator url is broken for Bitbucket repos\n1924188 - Language selector dropdown doesn\u0027t always pre-select the language\n1924365 - Add extra disk for VM which use boot source PXE\n1924383 - Degraded network operator during upgrade to 4.7.z\n1924387 - [ja_JP][zh_CN] Incorrect warning message for deleting namespace on Delete Pod dialog box. \n1924480 - non cluster admin can not take VM snapshot: An error occurred, cannot set blockOwnerDeletion if an ownerReference refers to a resource you can\u0027t set finalizers on\n1924583 - Deprectaed templates are listed in the Templates screen\n1924870 - pick upstream pr#96901: plumb context with request deadline\n1924955 - Images from Private external registry not working in deploy Image\n1924961 - k8sutil.TrimDNS1123Label creates invalid values\n1924985 - Build egress-router-cni for both RHEL 7 and 8\n1925020 - Console demo plugin deployment image shoult not point to dockerhub\n1925024 - Remove extra validations on kafka source form view net section\n1925039 - [e2e] Fix Test - ID(CNV-5327) Change Custom Flavor while VM is running\n1925072 - NTO needs to ship the current latest stalld v1.7.0\n1925163 - Missing info about dev catalog in boot source template column\n1925200 - Monitoring Alert icon is missing on the workload in Topology view\n1925262 - apiserver getting 2 SIGTERM signals which was immediately making it exit code 1\n1925319 - bash syntax error in configure-ovs.sh script\n1925408 - Remove StatefulSet gatherer and replace it with gathering corresponding config map data\n1925516 - Pipeline Metrics Tooltips are overlapping data\n1925562 - Add new ArgoCD link from GitOps application environments page\n1925596 - Gitops details page image and commit id text overflows past card boundary\n1926556 - \u0027excessive etcd leader changes\u0027 test case failing in serial job because prometheus data is wiped by machine set test\n1926588 - The tarball of operator-sdk is not ready for ocp4.7\n1927456 - 4.7 still points to 4.6 catalog images\n1927500 - API server exits non-zero on 2 SIGTERM signals\n1929278 - Monitoring workloads using too high a priorityclass\n1929645 - Remove openshift:kubevirt-machine-controllers decleration from machine-api\n1929920 - Cluster monitoring documentation link is broken - 404 not found\n\n5. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-10103\nhttps://access.redhat.com/security/cve/CVE-2018-10105\nhttps://access.redhat.com/security/cve/CVE-2018-14461\nhttps://access.redhat.com/security/cve/CVE-2018-14462\nhttps://access.redhat.com/security/cve/CVE-2018-14463\nhttps://access.redhat.com/security/cve/CVE-2018-14464\nhttps://access.redhat.com/security/cve/CVE-2018-14465\nhttps://access.redhat.com/security/cve/CVE-2018-14466\nhttps://access.redhat.com/security/cve/CVE-2018-14467\nhttps://access.redhat.com/security/cve/CVE-2018-14468\nhttps://access.redhat.com/security/cve/CVE-2018-14469\nhttps://access.redhat.com/security/cve/CVE-2018-14470\nhttps://access.redhat.com/security/cve/CVE-2018-14553\nhttps://access.redhat.com/security/cve/CVE-2018-14879\nhttps://access.redhat.com/security/cve/CVE-2018-14880\nhttps://access.redhat.com/security/cve/CVE-2018-14881\nhttps://access.redhat.com/security/cve/CVE-2018-14882\nhttps://access.redhat.com/security/cve/CVE-2018-16227\nhttps://access.redhat.com/security/cve/CVE-2018-16228\nhttps://access.redhat.com/security/cve/CVE-2018-16229\nhttps://access.redhat.com/security/cve/CVE-2018-16230\nhttps://access.redhat.com/security/cve/CVE-2018-16300\nhttps://access.redhat.com/security/cve/CVE-2018-16451\nhttps://access.redhat.com/security/cve/CVE-2018-16452\nhttps://access.redhat.com/security/cve/CVE-2018-20843\nhttps://access.redhat.com/security/cve/CVE-2019-3884\nhttps://access.redhat.com/security/cve/CVE-2019-5018\nhttps://access.redhat.com/security/cve/CVE-2019-6977\nhttps://access.redhat.com/security/cve/CVE-2019-6978\nhttps://access.redhat.com/security/cve/CVE-2019-8625\nhttps://access.redhat.com/security/cve/CVE-2019-8710\nhttps://access.redhat.com/security/cve/CVE-2019-8720\nhttps://access.redhat.com/security/cve/CVE-2019-8743\nhttps://access.redhat.com/security/cve/CVE-2019-8764\nhttps://access.redhat.com/security/cve/CVE-2019-8766\nhttps://access.redhat.com/security/cve/CVE-2019-8769\nhttps://access.redhat.com/security/cve/CVE-2019-8771\nhttps://access.redhat.com/security/cve/CVE-2019-8782\nhttps://access.redhat.com/security/cve/CVE-2019-8783\nhttps://access.redhat.com/security/cve/CVE-2019-8808\nhttps://access.redhat.com/security/cve/CVE-2019-8811\nhttps://access.redhat.com/security/cve/CVE-2019-8812\nhttps://access.redhat.com/security/cve/CVE-2019-8813\nhttps://access.redhat.com/security/cve/CVE-2019-8814\nhttps://access.redhat.com/security/cve/CVE-2019-8815\nhttps://access.redhat.com/security/cve/CVE-2019-8816\nhttps://access.redhat.com/security/cve/CVE-2019-8819\nhttps://access.redhat.com/security/cve/CVE-2019-8820\nhttps://access.redhat.com/security/cve/CVE-2019-8823\nhttps://access.redhat.com/security/cve/CVE-2019-8835\nhttps://access.redhat.com/security/cve/CVE-2019-8844\nhttps://access.redhat.com/security/cve/CVE-2019-8846\nhttps://access.redhat.com/security/cve/CVE-2019-9455\nhttps://access.redhat.com/security/cve/CVE-2019-9458\nhttps://access.redhat.com/security/cve/CVE-2019-11068\nhttps://access.redhat.com/security/cve/CVE-2019-12614\nhttps://access.redhat.com/security/cve/CVE-2019-13050\nhttps://access.redhat.com/security/cve/CVE-2019-13225\nhttps://access.redhat.com/security/cve/CVE-2019-13627\nhttps://access.redhat.com/security/cve/CVE-2019-14889\nhttps://access.redhat.com/security/cve/CVE-2019-15165\nhttps://access.redhat.com/security/cve/CVE-2019-15166\nhttps://access.redhat.com/security/cve/CVE-2019-15903\nhttps://access.redhat.com/security/cve/CVE-2019-15917\nhttps://access.redhat.com/security/cve/CVE-2019-15925\nhttps://access.redhat.com/security/cve/CVE-2019-16167\nhttps://access.redhat.com/security/cve/CVE-2019-16168\nhttps://access.redhat.com/security/cve/CVE-2019-16231\nhttps://access.redhat.com/security/cve/CVE-2019-16233\nhttps://access.redhat.com/security/cve/CVE-2019-16935\nhttps://access.redhat.com/security/cve/CVE-2019-17450\nhttps://access.redhat.com/security/cve/CVE-2019-17546\nhttps://access.redhat.com/security/cve/CVE-2019-18197\nhttps://access.redhat.com/security/cve/CVE-2019-18808\nhttps://access.redhat.com/security/cve/CVE-2019-18809\nhttps://access.redhat.com/security/cve/CVE-2019-19046\nhttps://access.redhat.com/security/cve/CVE-2019-19056\nhttps://access.redhat.com/security/cve/CVE-2019-19062\nhttps://access.redhat.com/security/cve/CVE-2019-19063\nhttps://access.redhat.com/security/cve/CVE-2019-19068\nhttps://access.redhat.com/security/cve/CVE-2019-19072\nhttps://access.redhat.com/security/cve/CVE-2019-19221\nhttps://access.redhat.com/security/cve/CVE-2019-19319\nhttps://access.redhat.com/security/cve/CVE-2019-19332\nhttps://access.redhat.com/security/cve/CVE-2019-19447\nhttps://access.redhat.com/security/cve/CVE-2019-19524\nhttps://access.redhat.com/security/cve/CVE-2019-19533\nhttps://access.redhat.com/security/cve/CVE-2019-19537\nhttps://access.redhat.com/security/cve/CVE-2019-19543\nhttps://access.redhat.com/security/cve/CVE-2019-19602\nhttps://access.redhat.com/security/cve/CVE-2019-19767\nhttps://access.redhat.com/security/cve/CVE-2019-19770\nhttps://access.redhat.com/security/cve/CVE-2019-19906\nhttps://access.redhat.com/security/cve/CVE-2019-19956\nhttps://access.redhat.com/security/cve/CVE-2019-20054\nhttps://access.redhat.com/security/cve/CVE-2019-20218\nhttps://access.redhat.com/security/cve/CVE-2019-20386\nhttps://access.redhat.com/security/cve/CVE-2019-20387\nhttps://access.redhat.com/security/cve/CVE-2019-20388\nhttps://access.redhat.com/security/cve/CVE-2019-20454\nhttps://access.redhat.com/security/cve/CVE-2019-20636\nhttps://access.redhat.com/security/cve/CVE-2019-20807\nhttps://access.redhat.com/security/cve/CVE-2019-20812\nhttps://access.redhat.com/security/cve/CVE-2019-20907\nhttps://access.redhat.com/security/cve/CVE-2019-20916\nhttps://access.redhat.com/security/cve/CVE-2020-0305\nhttps://access.redhat.com/security/cve/CVE-2020-0444\nhttps://access.redhat.com/security/cve/CVE-2020-1716\nhttps://access.redhat.com/security/cve/CVE-2020-1730\nhttps://access.redhat.com/security/cve/CVE-2020-1751\nhttps://access.redhat.com/security/cve/CVE-2020-1752\nhttps://access.redhat.com/security/cve/CVE-2020-1971\nhttps://access.redhat.com/security/cve/CVE-2020-2574\nhttps://access.redhat.com/security/cve/CVE-2020-2752\nhttps://access.redhat.com/security/cve/CVE-2020-2922\nhttps://access.redhat.com/security/cve/CVE-2020-3862\nhttps://access.redhat.com/security/cve/CVE-2020-3864\nhttps://access.redhat.com/security/cve/CVE-2020-3865\nhttps://access.redhat.com/security/cve/CVE-2020-3867\nhttps://access.redhat.com/security/cve/CVE-2020-3868\nhttps://access.redhat.com/security/cve/CVE-2020-3885\nhttps://access.redhat.com/security/cve/CVE-2020-3894\nhttps://access.redhat.com/security/cve/CVE-2020-3895\nhttps://access.redhat.com/security/cve/CVE-2020-3897\nhttps://access.redhat.com/security/cve/CVE-2020-3898\nhttps://access.redhat.com/security/cve/CVE-2020-3899\nhttps://access.redhat.com/security/cve/CVE-2020-3900\nhttps://access.redhat.com/security/cve/CVE-2020-3901\nhttps://access.redhat.com/security/cve/CVE-2020-3902\nhttps://access.redhat.com/security/cve/CVE-2020-6405\nhttps://access.redhat.com/security/cve/CVE-2020-7595\nhttps://access.redhat.com/security/cve/CVE-2020-7774\nhttps://access.redhat.com/security/cve/CVE-2020-8177\nhttps://access.redhat.com/security/cve/CVE-2020-8492\nhttps://access.redhat.com/security/cve/CVE-2020-8563\nhttps://access.redhat.com/security/cve/CVE-2020-8566\nhttps://access.redhat.com/security/cve/CVE-2020-8619\nhttps://access.redhat.com/security/cve/CVE-2020-8622\nhttps://access.redhat.com/security/cve/CVE-2020-8623\nhttps://access.redhat.com/security/cve/CVE-2020-8624\nhttps://access.redhat.com/security/cve/CVE-2020-8647\nhttps://access.redhat.com/security/cve/CVE-2020-8648\nhttps://access.redhat.com/security/cve/CVE-2020-8649\nhttps://access.redhat.com/security/cve/CVE-2020-9327\nhttps://access.redhat.com/security/cve/CVE-2020-9802\nhttps://access.redhat.com/security/cve/CVE-2020-9803\nhttps://access.redhat.com/security/cve/CVE-2020-9805\nhttps://access.redhat.com/security/cve/CVE-2020-9806\nhttps://access.redhat.com/security/cve/CVE-2020-9807\nhttps://access.redhat.com/security/cve/CVE-2020-9843\nhttps://access.redhat.com/security/cve/CVE-2020-9850\nhttps://access.redhat.com/security/cve/CVE-2020-9862\nhttps://access.redhat.com/security/cve/CVE-2020-9893\nhttps://access.redhat.com/security/cve/CVE-2020-9894\nhttps://access.redhat.com/security/cve/CVE-2020-9895\nhttps://access.redhat.com/security/cve/CVE-2020-9915\nhttps://access.redhat.com/security/cve/CVE-2020-9925\nhttps://access.redhat.com/security/cve/CVE-2020-10018\nhttps://access.redhat.com/security/cve/CVE-2020-10029\nhttps://access.redhat.com/security/cve/CVE-2020-10732\nhttps://access.redhat.com/security/cve/CVE-2020-10749\nhttps://access.redhat.com/security/cve/CVE-2020-10751\nhttps://access.redhat.com/security/cve/CVE-2020-10763\nhttps://access.redhat.com/security/cve/CVE-2020-10773\nhttps://access.redhat.com/security/cve/CVE-2020-10774\nhttps://access.redhat.com/security/cve/CVE-2020-10942\nhttps://access.redhat.com/security/cve/CVE-2020-11565\nhttps://access.redhat.com/security/cve/CVE-2020-11668\nhttps://access.redhat.com/security/cve/CVE-2020-11793\nhttps://access.redhat.com/security/cve/CVE-2020-12465\nhttps://access.redhat.com/security/cve/CVE-2020-12655\nhttps://access.redhat.com/security/cve/CVE-2020-12659\nhttps://access.redhat.com/security/cve/CVE-2020-12770\nhttps://access.redhat.com/security/cve/CVE-2020-12826\nhttps://access.redhat.com/security/cve/CVE-2020-13249\nhttps://access.redhat.com/security/cve/CVE-2020-13630\nhttps://access.redhat.com/security/cve/CVE-2020-13631\nhttps://access.redhat.com/security/cve/CVE-2020-13632\nhttps://access.redhat.com/security/cve/CVE-2020-14019\nhttps://access.redhat.com/security/cve/CVE-2020-14040\nhttps://access.redhat.com/security/cve/CVE-2020-14381\nhttps://access.redhat.com/security/cve/CVE-2020-14382\nhttps://access.redhat.com/security/cve/CVE-2020-14391\nhttps://access.redhat.com/security/cve/CVE-2020-14422\nhttps://access.redhat.com/security/cve/CVE-2020-15157\nhttps://access.redhat.com/security/cve/CVE-2020-15503\nhttps://access.redhat.com/security/cve/CVE-2020-15862\nhttps://access.redhat.com/security/cve/CVE-2020-15999\nhttps://access.redhat.com/security/cve/CVE-2020-16166\nhttps://access.redhat.com/security/cve/CVE-2020-24490\nhttps://access.redhat.com/security/cve/CVE-2020-24659\nhttps://access.redhat.com/security/cve/CVE-2020-25211\nhttps://access.redhat.com/security/cve/CVE-2020-25641\nhttps://access.redhat.com/security/cve/CVE-2020-25658\nhttps://access.redhat.com/security/cve/CVE-2020-25661\nhttps://access.redhat.com/security/cve/CVE-2020-25662\nhttps://access.redhat.com/security/cve/CVE-2020-25681\nhttps://access.redhat.com/security/cve/CVE-2020-25682\nhttps://access.redhat.com/security/cve/CVE-2020-25683\nhttps://access.redhat.com/security/cve/CVE-2020-25684\nhttps://access.redhat.com/security/cve/CVE-2020-25685\nhttps://access.redhat.com/security/cve/CVE-2020-25686\nhttps://access.redhat.com/security/cve/CVE-2020-25687\nhttps://access.redhat.com/security/cve/CVE-2020-25694\nhttps://access.redhat.com/security/cve/CVE-2020-25696\nhttps://access.redhat.com/security/cve/CVE-2020-26160\nhttps://access.redhat.com/security/cve/CVE-2020-27813\nhttps://access.redhat.com/security/cve/CVE-2020-27846\nhttps://access.redhat.com/security/cve/CVE-2020-28362\nhttps://access.redhat.com/security/cve/CVE-2020-29652\nhttps://access.redhat.com/security/cve/CVE-2021-2007\nhttps://access.redhat.com/security/cve/CVE-2021-3121\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n6. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nMcvuEaxco7U=\n=sw8i\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n1660798 - NFSv4.2: security label of mount point shows as \"unlabeled_t\" for ~30 seconds after mounting\n1718176 - CVE-2019-12614 kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service\n1759052 - CVE-2019-15925 kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg\n1760100 - CVE-2019-15917 kernel: use-after-free in drivers/bluetooth/hci_ldisc.c\n1760310 - CVE-2019-16231 kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c\n1760420 - CVE-2019-16233 kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c\n1774946 - CVE-2019-19072 kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS\n1774963 - CVE-2019-19068 kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS\n1774988 - CVE-2019-19046 kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c\n1775015 - CVE-2019-19063 kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS\n1775021 - CVE-2019-19062 kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS\n1775097 - CVE-2019-19056 kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS\n1777418 - CVE-2019-18808 kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c\n1777449 - CVE-2019-18809 kernel: memory leak in  af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c\n1778762 - Please backport Jitter Entropy patches\n1779594 - CVE-2019-19332 Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid\n1781679 - CVE-2019-19447 kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c\n1781810 - CVE-2019-19543 kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c\n1783459 - CVE-2019-19524 kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free\n1783534 - CVE-2019-19533 kernel: information leak bug caused  by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c\n1783561 - CVE-2019-19537 kernel: race condition caused by a malicious USB device in the USB character device driver layer\n1784130 - CVE-2019-19319 kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c\n1786160 - CVE-2019-19767 kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c\n1786179 - CVE-2019-19770 kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c\n1790063 - CVE-2019-20054 kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c\n1802555 - CVE-2020-8649 kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c\n1802559 - CVE-2020-8648 kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c\n1802563 - CVE-2020-8647 kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c\n1817718 - CVE-2020-10942 kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field\n1819377 - CVE-2019-9458 kernel: use after free due to race condition in the video driver leads to local privilege escalation\n1819399 - CVE-2019-9455 kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure\n1820402 - Sometimes hit \"error: kvm run failed Bad address\" when launching a guest on Power8\n1822077 - CVE-2020-12826 kernel: possible to send arbitrary signals to a privileged (suidroot) parent process\n1823764 - RFE: Enable genfs+xattr labeling for CephFS\n1824059 - CVE-2019-20636 kernel: out-of-bounds write via crafted keycode table\n1824792 - CVE-2020-11668 kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c\n1824918 - CVE-2020-11565 kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c\n1830280 - Please enable CONFIG_RANDOM_TRUST_CPU\n1831399 - CVE-2020-10732 kernel: uninitialized kernel data leak in userspace coredumps\n1831699 - CVE-2020-12465 kernel: buffer overflow in mt76_add_fragment function in drivers/net/wireless/mediatek/mt76/dma.c\n1832543 - CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata\n1832876 - CVE-2020-12659 kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption\n1834845 - CVE-2020-12770 kernel: sg_write function lacks an sg_remove_request call in a certain failure case\n1839634 - CVE-2020-10751 kernel: SELinux netlink permission check bypass\n1844520 - Incorrect pinning of IRQ threads on isolated CPUs by drivers that use cpumask_local_spread()\n1846380 - CVE-2020-10773 kernel: kernel stack information leak on s390/s390x\n1846964 - CVE-2020-10774 kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features\n1853447 - Guest IA32_SPEC_CTRL wrmsr failure on AMD processors that support STIBP but don\u0027t support for IBRS\n1856588 - Guest crashed and hung when hot unplug vcpus\n1860065 - CVE-2020-0305 kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c\n1874311 - CVE-2020-14381 kernel: referencing inode of removed superblock in get_futex_key() causes UAF\n1881424 - CVE-2020-25641 kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS\n\n6",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-8648"
      },
      {
        "db": "VULHUB",
        "id": "VHN-186773"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-8648"
      },
      {
        "db": "PACKETSTORM",
        "id": "163968"
      },
      {
        "db": "PACKETSTORM",
        "id": "157489"
      },
      {
        "db": "PACKETSTORM",
        "id": "159819"
      },
      {
        "db": "PACKETSTORM",
        "id": "163188"
      },
      {
        "db": "PACKETSTORM",
        "id": "163020"
      },
      {
        "db": "PACKETSTORM",
        "id": "161546"
      },
      {
        "db": "PACKETSTORM",
        "id": "157485"
      },
      {
        "db": "PACKETSTORM",
        "id": "159814"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-8648",
        "trust": 2.7
      },
      {
        "db": "PACKETSTORM",
        "id": "163020",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-148",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "163968",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "164140",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0796",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.2039",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1745.2",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0719",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1476",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0692",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.2008",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0772",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1164",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2032",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1910",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0908",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.6112",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3443",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3075",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0797",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1745",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1812",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.0925",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.3888",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2957",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2020.1584",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4047",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2180",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "157491",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021062117",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "45778",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-04530",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163026",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-186773",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-8648",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "157489",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "159819",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "163188",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "161546",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "157485",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "159814",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-186773"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-8648"
      },
      {
        "db": "PACKETSTORM",
        "id": "163968"
      },
      {
        "db": "PACKETSTORM",
        "id": "157489"
      },
      {
        "db": "PACKETSTORM",
        "id": "159819"
      },
      {
        "db": "PACKETSTORM",
        "id": "163188"
      },
      {
        "db": "PACKETSTORM",
        "id": "163020"
      },
      {
        "db": "PACKETSTORM",
        "id": "161546"
      },
      {
        "db": "PACKETSTORM",
        "id": "164140"
      },
      {
        "db": "PACKETSTORM",
        "id": "157485"
      },
      {
        "db": "PACKETSTORM",
        "id": "159814"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-148"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-8648"
      }
    ]
  },
  "id": "VAR-202002-1243",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-186773"
      }
    ],
    "trust": 0.725
  },
  "last_update_date": "2024-11-29T22:25:35.647000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Amazon Linux 2: ALAS2LIVEPATCH-2020-005",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2020-005"
      },
      {
        "title": "Amazon Linux 2: ALAS2LIVEPATCH-2020-004",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2020-004"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-lts-xenial, linux-raspi2, linux-snapdragon vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4346-1"
      },
      {
        "title": "Amazon Linux 2: ALAS2LIVEPATCH-2020-006",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2020-006"
      },
      {
        "title": "Ubuntu Security Notice: linux-gke-5.0, linux-oem-osp11 vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4344-1"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-gke-5.3, linux-hwe, linux-kvm, linux-raspi2, linux-raspi2-5.3 vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4342-1"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2020-1360",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2020-1360"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4345-1"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2020-1405",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2020-1405"
      },
      {
        "title": "Brocade Security Advisories: Access Denied",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=brocade_security_advisories\u0026qid=0653676430b6017016f55e261b78af9c"
      },
      {
        "title": "Red Hat: Moderate: kernel-rt security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20204609 - Security Advisory"
      },
      {
        "title": "Red Hat: Moderate: kernel security, bug fix, and enhancement update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20204431 - Security Advisory"
      },
      {
        "title": "Debian Security Advisories: DSA-4698-1 linux -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=88a848047667226a68bbe6de9bb29095"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/vincent-deng/veracode-container-security-finding-parser "
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/two-critical-android-bugs-rce/156216/"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2020-8648"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-416",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-186773"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-8648"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "https://usn.ubuntu.com/4346-1/"
      },
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20200924-0004/"
      },
      {
        "trust": 1.8,
        "url": "https://www.debian.org/security/2020/dsa-4698"
      },
      {
        "trust": 1.8,
        "url": "https://bugzilla.kernel.org/show_bug.cgi?id=206361"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html"
      },
      {
        "trust": 1.8,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"
      },
      {
        "trust": 1.8,
        "url": "https://usn.ubuntu.com/4342-1/"
      },
      {
        "trust": 1.8,
        "url": "https://usn.ubuntu.com/4344-1/"
      },
      {
        "trust": 1.8,
        "url": "https://usn.ubuntu.com/4345-1/"
      },
      {
        "trust": 1.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8648"
      },
      {
        "trust": 0.7,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/security/cve/cve-2020-8648"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.3888/"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/linux-kernel-use-after-free-via-n-tty-receive-buf-common-31537"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0908/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1584/"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/45778"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/157491/ubuntu-security-notice-usn-4346-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0796/"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6520482"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2957"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163968/red-hat-security-advisory-2021-3320-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0772/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.2039/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.6112"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4047"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2180"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1164/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1910/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3075"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0719/"
      },
      {
        "trust": 0.6,
        "url": "https://source.android.com/security/bulletin/2020-06-01"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0925/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1745.2/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.0797/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/163020/red-hat-security-advisory-2021-2314-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0692"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2032"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021062117"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.2008/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3443"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164140/red-hat-security-advisory-2021-3522-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1745/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1812/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2020.1476/"
      },
      {
        "trust": 0.5,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19046"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19770"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19447"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-11668"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-16233"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-16231"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-14381"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19056"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19072"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19524"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-8649"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19543"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-8647"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-12770"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-25641"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19767"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-12655"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19533"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-9458"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19537"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-10751"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-15917"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-9455"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19068"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-20636"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-15925"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-10774"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-18808"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-11565"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-18809"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19332"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-10942"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19063"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19062"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-10732"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-19319"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2019-20054"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-0305"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-12659"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2020-12826"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2021-3347"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32399"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-32399"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10942"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19768"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16234"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9383"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19543"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19046"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19447"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9458"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16231"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16233"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19537"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19770"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9455"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18809"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15925"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20054"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19068"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index"
      },
      {
        "trust": 0.2,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19319"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19063"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19767"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19062"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20636"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19056"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-15917"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19072"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19533"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18808"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19524"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19332"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12364"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-12363"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-12362"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-27170"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12362"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12363"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-28362"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-12364"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3347"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-10773"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-12465"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2019-12614"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/416.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://alas.aws.amazon.com/al2/alaslivepatch-2020-005.html"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3320"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1066.70"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1059.60"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1082.92~16.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1061.65"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1038.42"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1061.65"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11668"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-99.100"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1038.42~16.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11609"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11884"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1080.90"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4345-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1066.70~16.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-99.100~16.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11608"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1058.61"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1077.84"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2020:4609"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1073"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0305"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25039"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8286"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-28196"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-15358"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15358"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21639"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-28165"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14502"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-28092"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-13434"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25037"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13776"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25037"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-3842"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-13776"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-24977"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8231"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-27219"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-10878"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-29362"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24330"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-28935"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-28163"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13434"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-14502"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25034"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8285"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25035"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-10228"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-9169"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-14866"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-26116"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25038"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14866"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-26137"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25013"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21309"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25040"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21640"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-29361"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-28918"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-24330"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3543"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25042"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3501"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25042"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25648"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25038"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25032"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25041"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25036"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25032"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-27619"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-25215"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3177"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9169"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-24331"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25692"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3326"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25036"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25013"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25035"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-2708"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23336"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-2433"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8927"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10543"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-29363"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-24332"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3114"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3842"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-10543"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25039"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-25040"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2708"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2016-10228"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10878"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25041"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2461"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8284"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25034"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-27618"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27170"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:2314"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25662"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-20907"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8624"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-16300"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14466"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-10105"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25684"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.7/updating/updating-cluster"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-13050"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-24490"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-2007"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9925"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-15166"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9802"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-20218"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-26160"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-16230"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9895"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8625"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-13225"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-13249"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-27846"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-15165"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-20388"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-14382"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8812"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3899"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8819"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10103"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14467"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14469"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11068"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3867"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-1971"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-16229"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8720"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9893"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-19221"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8808"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14553"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3902"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14465"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14882"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8623"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-16227"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-18197"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-1751"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3900"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8566"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-15862"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25683"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25211"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14461"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-19602"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14881"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9805"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14464"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8820"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9807"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8769"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8710"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8813"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25661"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9850"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14463"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-7595"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-10749"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-6977"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8811"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16228"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14879"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-29652"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-16168"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9803"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8177"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9862"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-24659"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-16166"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14469"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-7774"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9327"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10105"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14880"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3885"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-17450"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-15503"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-16935"
      },
      {
        "trust": 0.1,
        "url": "https://\u0027"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14461"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-20916"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-5018"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-19956"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-1716"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-10018"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-20812"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2020:5633"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14468"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-14422"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-15157"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8835"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-6978"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25658"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-0444"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8764"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14466"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8844"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3865"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14882"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-1730"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16452"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3864"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16227"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25694"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14464"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-19906"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14553"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-2752"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16230"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-20386"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-20387"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-14391"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-15999"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14468"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14467"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14462"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3862"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14880"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25682"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14881"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-2574"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3901"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-17546"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16300"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-3884"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-10763"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8823"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14462"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-1752"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16229"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8622"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-15903"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3895"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8492"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-11793"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-20454"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-20843"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25696"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9894"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25685"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8816"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9843"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-13627"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-6405"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8771"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-16451"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3897"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-10103"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-16228"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9806"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14463"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8814"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-14889"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8743"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3121"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-9915"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20843"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25686"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8815"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-2922"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-13632"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25687"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-16167"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-10029"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16451"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8783"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-20807"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-13630"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-14040"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14879"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-14019"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14470"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25681"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14470"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8619"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-27813"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-14465"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-11068"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8766"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8563"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-13631"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2018-16452"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8846"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3868"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3894"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-8782"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-3898"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2020:5634"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-22555"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3522"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22555"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1035.36"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8992"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/4344-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-oem-osp1/5.0.0-1050.55"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19051"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2020:4431"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12614"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-186773"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-8648"
      },
      {
        "db": "PACKETSTORM",
        "id": "163968"
      },
      {
        "db": "PACKETSTORM",
        "id": "157489"
      },
      {
        "db": "PACKETSTORM",
        "id": "159819"
      },
      {
        "db": "PACKETSTORM",
        "id": "163188"
      },
      {
        "db": "PACKETSTORM",
        "id": "163020"
      },
      {
        "db": "PACKETSTORM",
        "id": "161546"
      },
      {
        "db": "PACKETSTORM",
        "id": "164140"
      },
      {
        "db": "PACKETSTORM",
        "id": "157485"
      },
      {
        "db": "PACKETSTORM",
        "id": "159814"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-148"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-8648"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-186773"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-8648"
      },
      {
        "db": "PACKETSTORM",
        "id": "163968"
      },
      {
        "db": "PACKETSTORM",
        "id": "157489"
      },
      {
        "db": "PACKETSTORM",
        "id": "159819"
      },
      {
        "db": "PACKETSTORM",
        "id": "163188"
      },
      {
        "db": "PACKETSTORM",
        "id": "163020"
      },
      {
        "db": "PACKETSTORM",
        "id": "161546"
      },
      {
        "db": "PACKETSTORM",
        "id": "164140"
      },
      {
        "db": "PACKETSTORM",
        "id": "157485"
      },
      {
        "db": "PACKETSTORM",
        "id": "159814"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-148"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-8648"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-02-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-186773"
      },
      {
        "date": "2020-02-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-8648"
      },
      {
        "date": "2021-08-31T15:57:21",
        "db": "PACKETSTORM",
        "id": "163968"
      },
      {
        "date": "2020-04-29T15:56:59",
        "db": "PACKETSTORM",
        "id": "157489"
      },
      {
        "date": "2020-11-04T15:24:37",
        "db": "PACKETSTORM",
        "id": "159819"
      },
      {
        "date": "2021-06-17T17:53:22",
        "db": "PACKETSTORM",
        "id": "163188"
      },
      {
        "date": "2021-06-09T13:15:48",
        "db": "PACKETSTORM",
        "id": "163020"
      },
      {
        "date": "2021-02-25T15:29:25",
        "db": "PACKETSTORM",
        "id": "161546"
      },
      {
        "date": "2021-09-14T15:55:54",
        "db": "PACKETSTORM",
        "id": "164140"
      },
      {
        "date": "2020-04-29T15:55:05",
        "db": "PACKETSTORM",
        "id": "157485"
      },
      {
        "date": "2020-11-04T15:23:46",
        "db": "PACKETSTORM",
        "id": "159814"
      },
      {
        "date": "2020-02-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202002-148"
      },
      {
        "date": "2020-02-06T01:15:10.890000",
        "db": "NVD",
        "id": "CVE-2020-8648"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-07-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-186773"
      },
      {
        "date": "2022-07-28T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-8648"
      },
      {
        "date": "2022-11-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202002-148"
      },
      {
        "date": "2024-11-21T05:39:11.030000",
        "db": "NVD",
        "id": "CVE-2020-8648"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "157489"
      },
      {
        "db": "PACKETSTORM",
        "id": "157485"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-148"
      }
    ],
    "trust": 0.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linux kernel Resource Management Error Vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-148"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202002-148"
      }
    ],
    "trust": 0.6
  }
}
  cnvd-2020-04530
Vulnerability from cnvd
厂商尚未提供漏洞修复方案,请关注厂商主页更新: https://www.kernel.org
| Name | Linux Linux kernel <=5.5.2 | 
|---|
{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2020-8648",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
    }
  },
  "description": "Linux kernel\u662f\u4e00\u79cd\u8ba1\u7b97\u673a\u64cd\u4f5c\u7cfb\u7edf\u5185\u6838\uff0c\u4ee5C\u8bed\u8a00\u548c\u6c47\u7f16\u8bed\u8a00\u5199\u6210\uff0c\u7b26\u5408POSIX\u6807\u51c6\uff0c\u6309GNU\u901a\u7528\u516c\u5171\u8bb8\u53ef\u8bc1\u53d1\u884c\u3002\n\nLinux kernel 5.5.2\u53ca\u66f4\u65e9\u7248\u672c\u4e2d\u7684drivers/tty/n_tty.c\u4e2d\u7684n_tty_receive_buf_common\u51fd\u6570\u5b58\u5728\u91ca\u653e\u540e\u91cd\u7528\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u8bbf\u95ee\u3002",
  "formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttps://www.kernel.org",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2020-04530",
  "openTime": "2020-02-11",
  "products": {
    "product": "Linux Linux kernel \u003c=5.5.2"
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
  "serverity": "\u4e2d",
  "submitTime": "2020-02-09",
  "title": "Linux kernel\u91ca\u653e\u540e\u91cd\u7528\u6f0f\u6d1e\uff08CNVD-2020-04530\uff09"
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.